Black Hat 2015: Researcher exploits Android bug to take complete control of device

Researchers with Check Point identified an Android vulnerability that can be exploited by an attacker to take complete control of almost any device running the popular mobile operating system. Not only can the attacker control the device, but they can spy on the user as well.

In this video, Avi Bashan, technology leader at Check Point, explains the issue and demonstrates exactly what an attacker can do if they successfully exploit the bug.

You must be a registered member of SC Magazine to post a comment.
close

Next Article in Director's Cut Videos