Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.
What is the attack performed on Don in the above scenario?
Vincent_Lu
Highly Voted 10 months, 1 week agoVincent_Lu
10 months, 1 week agoKingpin3690
10 months agoinsaniunt
Most Recent 4 months, 1 week ago581777a
8 months, 3 weeks agojeremy13
11 months, 3 weeks agoeli117
1 year ago