- Phone Devices
- Computer Hacking
- Tablet
- Operating Systems (OSes)
- Computer Vulnerabilities
- Software Vulnerabilities
- Legal
- Android
- Private Data / PII / Information
- Information and Communications Technology (ICT)
- Servers
- Users Affected
- Software Applications
- Hijacking / Spoofing Attack
- Edge