Summary: A security firm discovers flaws it calls "Quadrooter" that would let an attacker gain full control of an Android phone or tablet.
Summary: A security firm discovers flaws it calls "Quadrooter" that would let an attacker gain full control of an Android phone or tablet.