Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth.

Leave a Reply