Posted on
in Presentations
This talk will highlight serious security findings in Android smartphones, enabling attackers to remotely control, take, and retrieve photos, videos, and geolocation from victims’ phones without the victim knowing, even if the phone is locked or the screen is turned off. Join us to see how one team chained several weaknesses and features to create a fully weaponized rogue spy-application.
Pre-Requisites: General understanding of application security, vulnerability exploitation and remediation
Pre-Requisites: General understanding of application security, vulnerability exploitation and remediation
Share With Your Community