They have taken the place of traditional computers and hence, smartphone security has become equally more important.
A new possible threat that could occur in the cellular connection is introduced in this research.
The research analyzes the ability to use the cellular internet voice channel to leak information from the smartphones applications.
Various scenarios were created so you can find out the effectiveness of the proposed covert channel.
source: www.techworm.net