Unix HelloMoto by admin • June 15, 2006 • 0 Comments Features: Exploits incorrect implementation of the Trusted Device handle Uses Sending of Vcard to break through and add itself to “trusted devices” Once on trusted device list , Attacker can take control of phone through AT-commands