• A perfect cyber-espionage tool that can be used to track the victim’s
location, download personal information, intercept and send messages,
record their conversations and take pictures without them knowing.
• In the context of BYOD and APT, it makes a perfect platform for launching
inside attacks on corporate or government networks.
Complete slides and info:
How to Build a SpyPhone - Insiders point of view and how to use their
No replies to this topic
BinRev is hosted by the great people at Lunarpages!