Technology ❯Cybersecurity ❯Data Theft
Public Charging Risks
Researchers will present at the USENIX Security Symposium how the exploit spoofs input to trick smartphones into granting data access in under 133 milliseconds