Researchers with Check Point identified an Android vulnerability that can be exploited by an attacker to take complete control of almost any device running the popular mobile operating system. Not only can the attacker control the device, but they can spy on the user as well.
In this video, Avi Bashan, technology leader at Check Point, explains the issue and demonstrates exactly what an attacker can do if they successfully exploit the bug.