http://www.w3.org/ns/prov#value | - The researchers proposed other attack scenarios, including infecting a target's smartphone with sound-monitoring malware; placing a bug or infected computer or mobile device in a charging station, presentation podium, or other location where PCs are often placed; or keeping a listening device in a server room.
|