Home >> News >> Exploiting Silent Circle’s Secure Android Blackphone

Exploiting Silent Circle’s Secure Android Blackphone

Red Naga has publicly posted its training materials on GitHub, including the steps the group used to find mobile device vulnerabilities. At a high level, the approach is all about looking for items that appear to be misconfigured in some way.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

*