It is quite common to hear about smartphone compromises today: these intrusions allow access to data stored on the phone, or the installation of spyware. Today, it is in fact the complexity of smartphones that makes them so vulnerable to intrusions (architecture, operation) and so difficult to completely secure from a technical point of view. The Pegasus […] … learn more→