Also, capture photos using the phone's camera, access the victim's passwords, and monitor the phone's location in real time, according to security researchers.
Also, capture photos using the phone's camera, access the victim's passwords, and monitor the phone's location in real time, according to security researchers.