Crime ❯Cybercrime ❯Hacking ❯Data Theft
Investigators have identified a low-profile exfiltration route, prompting a complete overhaul of the mobile device system