- Software Applications
- Software Vulnerabilities
- Cryptography / Key-Pairs
- Cyber Attackers
- Cyber Attacks
- Computer Hacking
- Smartphones
- Software Exploitation
- Networked Devices
- Phone Devices
- Theft
- Users Affected
- Operating Systems (OSes)
- Mobile Devices
- Computer Vulnerabilities
- Risks