Introduction

A spate of news reports have revealed just how vulnerable corporations and government organizations are to security breaches and the theft of sensitive data leaked or stolen from employees’ personal devices. In 2014, a warning issued by the Indian Air Force sent alarms among security establishments. It was reported that smart-phones were routing positioning and other user-data to servers in China. [1]

Read More