Hello NANOG,

 

I’m working on a presentation and need your help.  I’m looking for a case study where a compromised iOS, Android or other mobile device was utilized as a backdoor to compromise an enterprise network.  Any help will be appreciated.

 

Regards,

Christopher