Monday, February 7, 2011

Exploiting vulnerabilities in mobile phones

This video from Immunity shows how a mobile phone can be remotely exploited in order to gain access to the enterprise network and/or  steal the personal data stored in the phone itself.

No comments:

Post a Comment