Thursday, July 30, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Researchers Showcase Javascript-based Attack On a Computer's DRAM
Hackers Used Twitter hashtags To Extract Data From Compromised Networks
Facebook Unveils New Security Checkup Tool
Court of Appeals Rejects Google's Move To Overturn Microsoft's Patent Royalty Victory
Toshiba Expands Lineup of Phase Detection Auto-Focus-equipped CMOS Image Sensors for Smartphones
Sony Profit Rises Following Demand For Mobile Cameras
Facebook Profit Fell In 2Q
Galaxy S6 Sales Not Enough To Keep Samsung's Profit High
Active Discussions
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 31, 2014
Researchers Discover New Smartphone Flaws


Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data.

The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.



Previous
Next
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo        All News        U.S. Government Issues Warning About Malicious Software
HP's Luxury Smartwatch Coming This Fall     Mobiles News      Samsung And Apple See Their Smartphone Market Shares Plunging

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .