Breaking News

ASUSTOR at Computex 2026 Exceed the Infinite with New ASRock X870E Taichi White Motherboard Fanatec unveils new products and performance upgrades at Spring Showcase LG Electronics Introduces First UltraGear evo Hyper Mini LED 5K Gaming Monitor CORSAIR Launches ThermalProtect PCIe 5.1 600W 12V-2x6 Cable to Help Protect GPUs from Overheating

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

 Researchers Discover New Smartphone Flaws

Researchers Discover New Smartphone Flaws

Smartphones Jul 31,2014 0

Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data. The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.

Tags:
Previous Post
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo
Next Post
U.S. Government Issues Warning About Malicious Software

Related Posts

Latest News

ASUSTOR at Computex 2026
Enterprise & IT

ASUSTOR at Computex 2026

Exceed the Infinite with New ASRock X870E Taichi White Motherboard
PC components

Exceed the Infinite with New ASRock X870E Taichi White Motherboard

Fanatec unveils new products and performance upgrades at Spring Showcase
Gaming

Fanatec unveils new products and performance upgrades at Spring Showcase

LG Electronics Introduces First UltraGear evo Hyper Mini LED 5K Gaming Monitor
Gaming

LG Electronics Introduces First UltraGear evo Hyper Mini LED 5K Gaming Monitor

CORSAIR Launches ThermalProtect PCIe 5.1 600W 12V-2x6 Cable to Help Protect GPUs from Overheating
Enterprise & IT

CORSAIR Launches ThermalProtect PCIe 5.1 600W 12V-2x6 Cable to Help Protect GPUs from Overheating

Popular Reviews

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Crucial T710 2TB NVME SSD

Crucial T710 2TB NVME SSD

JSAUX 65Wh Rog Ally Battery

JSAUX 65Wh Rog Ally Battery

Introducing PriceHub

Introducing PriceHub

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed