Attacks on Mobile Devices are no longer uncommon. Hackers will use what we rely on most meaning network connectivity in an effort to obtain your corporate/personal credentials.
Are you sure that someone is not sitting between your network communications?
This demo is presented by our Platinum Sponsor: Checkpoint