Powered by :
Upon infection, CopyCat first roots the user’s device, allowing the attackers to gain full control of the device and essentially leaving the user defenceless, researchers said.
Share this article
If you liked this article share it with your friends.they will thank you later