This is a dedicated watch page for a single video.
Roman, a skilled hacker, successfully installed spyware on a target iPhone to clandestinely monitor the user's activities. By remotely jailbreaking the device, he gained full control and could record audio, capture screenshots, and monitor phone calls and SMS messages. What is the specific type of spyware that Roman employed to infect the target device?