Bogus credentials may be enough to ensnare some smartphone apps, researchers say.
Sign in to post comments.
Comments (0)
Sign in to post comments.