Clip

How Hackers Break into Your Phone
listen on Spotify
42:06 - 43:49 (01:43)

A hacker can exploit a vulnerability inside the baseband processor of a phone to gain code execution and access to the nearest base station from the carrier, putting the user's phone at risk of attacks like text interception, call interruption, and location tracking.

Similar Clips