Star 0

Abstract

This presentation will feature a live demonstration of how cyber-criminals can use remotely controlled SpyPhone software hidden in a normal application to track a phone’s location, intercept calls, extract contact lists, operate the camera and record conversations; all without the user’s knowledge. The presentation will also demonstrate injecting this SpyPhone software into an Android application.