Technology ❯Cybersecurity ❯Data Theft ❯Choicejacking
Researchers will present at the USENIX Security Symposium how the exploit spoofs input to trick smartphones into granting data access in under 133 milliseconds