Watch this video on YouTube
Which of the following types of attacks takes advantage of the growing use of smartphones?