(Q4745)

From Wikibase Personal data
Jump to navigation Jump to search

Statements

0 references
0 references
0 references
0 references
10 June 2020
0 references
Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.
0 references