A lot of hacks are done through browsers. Phones have browsers. When the Chinese make off with Federal Reserve documents because Joe IT logged in with a phone it doesn’t make it into the news.
It’s just the case that patched security flaws are standard practice for a reason. Hey - use http only, make all your passwords Password1, knock yourself out, but don’t expect others to be like “Yeah! Why are we doing all this . . security ???”
A lot of hacks are done through browsers. Phones have browsers. When the Chinese make off with Federal Reserve documents because Joe IT logged in with a phone it doesn’t make it into the news.
It’s just the case that patched security flaws are standard practice for a reason. Hey - use http only, make all your passwords Password1, knock yourself out, but don’t expect others to be like “Yeah! Why are we doing all this . . security ???”