Now security researchers have found at least one specimen of cybercriminal software that responds with the next logical countermeasure: It hijacks the phone, too.
And just about every technical countermeasure that brilliant engineers devised to protect vital computer systems and valuable information can be accidentally or intentionally circumvented by human interaction.