An assault on a computer, mobile device or network that requires the attacker to be near the device. In such cases, Wi-Fi, Bluetooth or NFC is typically used to transfer malware or extract sensitive ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results