Hello NANOG,

I'm working on a presentation and need your help.  I'm looking for a case study 
where a compromised iOS, Android or other mobile device was utilized as a 
backdoor to compromise an enterprise network.  Any help will be appreciated.

Regards,
Christopher

Reply via email to