Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.
What is the attack performed on Don in the above scenario?
Vincent_Lu
Highly Voted 1 year agoVincent_Lu
1 year agoKingpin3690
1 year agoinsaniunt
Most Recent 7 months ago581777a
11 months, 1 week agojeremy13
1 year, 2 months agoeli117
1 year, 3 months ago