Hello NANOG,
I’m working on a presentation and need your help. I’m looking for a case study where a compromised iOS, Android or other mobile device was utilized as a backdoor to compromise an enterprise network. Any help will be appreciated.
Regards,
Christopher