- Cyber Attackers
- Software Vulnerabilities
- Operating Systems (OSes)
- Users Affected
- Risks
- Networked Devices
- Mobile Devices
- Theft
- Software Exploitation
- Smartphones
- Computer Vulnerabilities
- Computer Hacking
- Phone Devices
- Software Applications
- Cryptography / Key-Pairs
- Cyber Attacks