The Underground Economy, Pt. 9
With more connected devices out there, hackers can reach people's information anyplace, anywhere. We look into the various schemes and techniques the cyber criminals use to get into mobile devices, including creating fake versions of real apps to trick unsuspecting victims.