Sunday, November 23, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Regin Trojan Enables Stealthy Surveillance: Symantec
ASTC Says 100 TB HDDs Coming in 2025
Alienware Alpha PC Gaming Console Now Shipping
Samsung Files ITC Complaint Against Nvidia
Europe To Ask Google Unlink Its Commercial And Search Services
Streaming TV Service Aereo Files for Bankruptcy
Square Launches Cash Register Service
Call of Duty: Advanced Warfare is the Biggest Entertainment Launch of 2014
Active Discussions
cdrw trouble
CDR for car Sat Nav
DVD/DL for Optiarc 7191S at 8X
Copied dvd's say blank in computer only
Made video, won't play back easily
New Features In Firefox 33
updated tests for dvd and cd burners
How to generate lots of different CDs quickly
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 31, 2014
Researchers Discover New Smartphone Flaws


Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data.

The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.



Previous
Next
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo        All News        U.S. Government Issues Warning About Malicious Software
HP's Luxury Smartwatch Coming This Fall     Mobiles News      Samsung And Apple See Their Smartphone Market Shares Plunging

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .