location, download personal information, intercept and send messages,
record their conversations and take pictures without them knowing.
• In the context of BYOD and APT, it makes a perfect platform for launching
inside attacks on corporate or government networks.
Complete slides and info:
Edited by Sp1nsp3n, 11 August 2014 - 06:48 AM.