Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.
What is the attack performed on Don in the above scenario?
Vincent_Lu
Highly Voted 6 months, 1 week agoVincent_Lu
6 months, 1 week agoKingpin3690
6 months agoinsaniunt
Most Recent 1 week, 4 days ago581777a
4 months, 2 weeks agojeremy13
7 months, 3 weeks agoeli117
8 months, 3 weeks ago