| http://www.w3.org/ns/prov#value | - An attack on a smartphone is a lot more than gaining access to your pictures and social media accounts; some people use their smartphones to store important information such as credit card numbers, bank financing applications, and e-mails and contacts for important business people.
|