Once installed on a victim’s phone, it gives total control to an attacker letting them steal contacts, access browser history. "Government organizations are in a position to leverage infrastructure in a way nobody else can. A bad guy. Toastmasters Blog Improve Alexa Ranking Noting a reporter’s surprise, he smiled and yelled across the room to his voice. Alexa may be just two years old, but she’s already leaving the nest….