Breaking News

ASUS Republic of Gamers Announces Availability of Swift OLED PG27AQWP-W and Strix OLED XG27AQWMG ASUS Announces Prime AP303 Compact Mid-Tower ATX Case Canon launches versatile EOS R6 Mark III and innovative RF 45mm F1.2 STM lens uHoo Launches Caeli – The Smart Air Quality Monitor DJI Introduces Osmo Mobile 8 with Intelligent Subject Tracking

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

 Researchers Discover New Smartphone Flaws

Researchers Discover New Smartphone Flaws

Smartphones Jul 31,2014 0

Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data. The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.

Tags:
Previous Post
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo
Next Post
U.S. Government Issues Warning About Malicious Software

Related Posts

Latest News

ASUS Republic of Gamers Announces Availability of Swift OLED PG27AQWP-W and Strix OLED XG27AQWMG
Gaming

ASUS Republic of Gamers Announces Availability of Swift OLED PG27AQWP-W and Strix OLED XG27AQWMG

ASUS Announces Prime AP303 Compact Mid-Tower ATX Case
Cooling Systems

ASUS Announces Prime AP303 Compact Mid-Tower ATX Case

Canon launches versatile EOS R6 Mark III and innovative RF 45mm F1.2 STM lens
Cameras

Canon launches versatile EOS R6 Mark III and innovative RF 45mm F1.2 STM lens

uHoo Launches Caeli – The Smart Air Quality Monitor
Consumer Electronics

uHoo Launches Caeli – The Smart Air Quality Monitor

DJI Introduces Osmo Mobile 8 with Intelligent Subject Tracking
Drones

DJI Introduces Osmo Mobile 8 with Intelligent Subject Tracking

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed