In the threat landscape, it can sometimes be difficult to classify if something should be considered a threat. Certainly, there are the blatantly obvious threats (read: malware) but there are some that merit discussion. One such example are “cloned” apps or “spoofed” apps. As the term suggests, “cloned” or “spoofed” apps are apps that resemble…
Read More