Saturday, August 29, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
IFA 2015: What We Know So Far
Acer Liquid Z410 And Liquid Jade Z Phones Released
Huawei Honor Phones Coming To Europe
AMD Radeon R9 370X Graphics Card Launched In Asia
Nokia Agrees on 'Shanghai Bell' Joint Venture with China Huaxin
Apple Debuts at the Number Two Spot In Wearables Market, Behind Fibit
Microsoft's Lumia 950 and 950 XL Windows 10 Smartphones Leaked Online
Facebook Says It Has One Billion Users Per Day
Active Discussions
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 31, 2014
Researchers Discover New Smartphone Flaws


Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data.

The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.



Previous
Next
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo        All News        U.S. Government Issues Warning About Malicious Software
HP's Luxury Smartwatch Coming This Fall     Mobiles News      Samsung And Apple See Their Smartphone Market Shares Plunging

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .