This is a dedicated watch page for a single video.
Vidic was hired to steal critical business documents from a competitor company. He exploits a vulnerability in over-the-air (OTA) programming on Android smartphones by sending messages to employees, pretending to be the network operator. The message requests the employee to enter a PIN code and accept new phone updates. Once the employee complies, Vidic intercepts all Internet traffic from the phone. What type of attack did Vidic use?