Black Hat 2014: Exploitation on a Global Scale: The Rise and Fall of the Control Protocol. Exploits include OTA code execution over all major cellular networks and operating systems. Attacks can be carried out on Android phones and tablets, but not everyone is protected from them. The attacks can be used to target specific areas of the device, such as the phone’s location, or to steal information from the device’s device’s software. The event is free and open to anyone with information about how to exploit it.”]
Source: https://www.darkreading.com/black-hat/black-hat-usa-2014-pockets-exploited/d/d-id/1278788

