Thursday, March 05, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
HBO, Apple To Launch Video Streaming Service: report
Xbox One wireless controller Adapter Coming To Windows PCs
Samsung, Oculus To Launch Gear VR Mobile Device Headsets This Year
Nvidia Demonstrates The Massive Titan X Graphics Card
IBM Buys AlchemyAPI
New Toshiba Smartwatch Reference Model features Bluetooth connectivity and Qi Wireless Charging
Samsung Expands Digital Display Portfolio with YESCO Electronics Acquisition
LG To Launch New Flagship Smartphone
Active Discussions
Need serious help!!!!
burning
nvidia 6200 review
Hello
Burning Multimedia in track 0
I'm lazy. Please help.
sanyo e6 camera
need help on some cd burning...
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 31, 2014
Researchers Discover New Smartphone Flaws


Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data.

The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.



Previous
Next
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo        All News        U.S. Government Issues Warning About Malicious Software
HP's Luxury Smartwatch Coming This Fall     Mobiles News      Samsung And Apple See Their Smartphone Market Shares Plunging

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .