Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.
What is the attack performed on Don in the above scenario?
Vincent_Lu
Highly Voted 11 months agoVincent_Lu
11 months agoKingpin3690
10 months, 3 weeks agoinsaniunt
Most Recent 5 months ago581777a
9 months, 1 week agojeremy13
1 year agoeli117
1 year, 1 month ago