![]() They work by accessing small components that come baked into the operating system when you buy your phone. (Ironic, huh?) If you call customer service because you can't get an app to work, or your calendar won't sync, reps use these tools to take over, fix what's wrong and get you on your way. The vulnerability is based on so-called mobile remote support tools, apps that allow manufacturers or service providers to access phones to fix problems remotely. I can record anything I want to, in any meeting, any conference room. That means bad guys can activate the microphone at any time they want. "More than that, it can turn a victim's mobile device into a spy phone. ![]() "It potentially allows cybercriminals to take complete control of any of these Android devices, enabling them to steal information from contact lists, calendars, location, anything that you have on your device," Check Point VP of product management Gabi Reish, told CBS News.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |