After being urged to connect their iPhone to a PC, the victims are then instructed to download the application and run it on the iPhone.
After being urged to connect their iPhone to a PC, the victims are then instructed to download the application and run it on the iPhone.