Project Summary: Find a recent digital forensics case where a mobile device was either compromised or was the origin of an attack. What was the primary method used for the breach/attack (such as brute force, unpatched system, etc)? What steps could have prevented the breach/attack? With all of the resources and information available regarding mobile device attacks, how/why are these attacks still occurring and still successful?