Exploiting Silent Circle's Secure Android Blackphone

Posted by red5 on Jan 7, 2016 5:43 PM EDT
eWEEK; By Sean Michael Kerner
Mail this story
Print this story

Red Naga has publicly posted its training materials on GitHub, including the steps the group used to find mobile device vulnerabilities. At a high level, the approach is all about looking for items that appear to be misconfigured in some way.

Full Story

  Nav
» Read more about: Story Type: Security; Groups: Android

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.