Posted on
in Presentations
This talk will highlight serious security findings in Android smartphones, enabling attackers to remotely control, take, and retrieve photos, videos, and geolocation from victims’ phones without the victim knowing, even if the phone is locked or the screen is turned off. Join us to see how one team chained several weaknesses and features to create a fully weaponized rogue spy-application.
Pre-Requisites: General understanding of application security, vulnerability exploitation and remediation
Pre-Requisites: General understanding of application security, vulnerability exploitation and remediation
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community