Attackers can take advantage of the fact these apps access, gather, store and transmit more information than any other app their victims have installed. …read more

Source:: Threatpost