- Users Affected
- Smartphones
- Risks
- Phone Devices
- Cyber Attacks
- Software Applications
- Cryptography / Key-Pairs
- Software Exploitation
- Mobile Devices
- Operating Systems (OSes)
- Computer Hacking
- Theft
- Computer Vulnerabilities
- Software Vulnerabilities
- Cyber Attackers
- Networked Devices