![]() The researcher says that the serial number and the version of the operating system were among the exfiltrated details. ![]() ![]() They collected browser history and data from the device that could be used for identification. Privacy_1st looked into the three apps from Trend Micro and saw that they had hardcoded strings for exfiltrating user information. IOS developer and 9to5Mac writer Guilherme Rambo found that Trend Micro's Dr.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |