News Analysis India
Written by
in
Attackers may use juice jacking to encrypt the user’s device, demanding ransom payments for its restoration.