Exploiting vulnerabilities in mobile phones Feb 7, 2011 • Xavier Garcia This video from Immunity shows how a mobile phone can be remotely exploited in order to gain access to the enterprise network and/or steal the personal data stored in the phone itself.