An attack typically works by convincing the user to download a seemingly innocuous app that monitors the external storage use of legitimate software. When the legit apps check for updates, their hostile counterparts modify externally-stored content to perform a variety of sinister actions once it reaches the innocent programs. They can install malware instead of …

Leave a comment

Your email address will not be published. Required fields are marked *

%d bloggers like this: