An attacker can hide amidst legitimate traffic in the application’s update function. …read more

Source:: Threatpost