Friday, June 23, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Google Promises to Stop Reading Your Emails in Gmail
BlackBerry's Software and Services Sales Fell in Q1
Handsets Expected to be Largest Market for ICs
G.SKILL Announces New DDR4 for the Intel X299 HEDT Platform
Toshiba Open to Further Talks With Western Digital About Chip Unit Sale
Foxconn Confirms US Investment Plan
Tesla Could Enter the Music-Streaming Business
Youtube Unveils New VR180 Format
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 31, 2014
Researchers Discover New Smartphone Flaws


Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data.

The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.



Previous
Next
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo        All News        U.S. Government Issues Warning About Malicious Software
HP's Luxury Smartwatch Coming This Fall     Mobiles News      Samsung And Apple See Their Smartphone Market Shares Plunging

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .