Get the latest tech news
Serbian student’s Android phone compromised by exploit from Cellebrite
Android users who haven’t installed Google’s February patch batch should do so ASAP.
Amnesty International first discovered evidence of the attack chain last year while investigating a separate incident outside of Serbia involving the same Android lockscreen bypass. Forensic traces identified in Amnesty International’s analysis of the compromised phone showed that the Serbian authorities tried to install an unknown application after the device had been unlocked. Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.
Or read this on ArsTechnica