Breaking News

Shuttle Launches the XZ890G2 Samsung and AMD Expand Strategic Collaboration on Next-Generation AI Memory Solutions Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads ASUS Republic of Gamers Strix Laptop Lineup Returns With the Latest Intel Core Ultra 9 290HX Plus Processors ASUS Announces 2026 TUF Gaming Laptop Lineup

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

 Researchers Discover New Smartphone Flaws

Researchers Discover New Smartphone Flaws

Smartphones Jul 31,2014 0

Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data. The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.

Tags:
Previous Post
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo
Next Post
U.S. Government Issues Warning About Malicious Software

Related Posts

Latest News

Shuttle Launches the XZ890G2
Enterprise & IT

Shuttle Launches the XZ890G2

Samsung and AMD Expand Strategic Collaboration on Next-Generation AI Memory Solutions
Enterprise & IT

Samsung and AMD Expand Strategic Collaboration on Next-Generation AI Memory Solutions

Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads
Enterprise & IT

Kioxia Announces New SSD Model Optimized for AI GPU-Initiated Workloads

ASUS Republic of Gamers Strix Laptop Lineup Returns With the Latest Intel Core Ultra 9 290HX Plus Processors
Gaming

ASUS Republic of Gamers Strix Laptop Lineup Returns With the Latest Intel Core Ultra 9 290HX Plus Processors

ASUS Announces 2026 TUF Gaming Laptop Lineup
Consumer Electronics

ASUS Announces 2026 TUF Gaming Laptop Lineup

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Arctic Liquid Freezer III 360 Pro Argb

Arctic Liquid Freezer III 360 Pro Argb

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed