Once this vicious bug has made its way onto a phone, it can be used by hackers to capture inputs, monitor the victim's screen ...