Return to Article Details Attacks on Cell Phones Through the Use of Mobile Applications: A Narrative Review Download Download PDF