Research Briefing 2.25.20
Ep 6 | 2.25.20
The CyberWire Pro Research Briefing for 2.25.20
Show Notes

Malware uses packet headers to communicate through firewalls. LTE networks and users subject to impersonation attacks. Transparent Tribe is active. Mobile security is commonly sacrificed for expediency. VPN apps vulnerable to man-in-the-middle attacks.