Crime ❯ Cybercrime ❯ Hacking ❯ Data Theft
Investigators have identified a low-profile exfiltration route, prompting a complete overhaul of the mobile device system