arstechnica.com/security/2014/02/how-to-turn-a-phone-into-a-covert-bugging-de...

James Bond-style attack underscores growing vulnerability of embedded software.


Comments (0)

Sign in to post comments.