Breaking News

Razer Unveils Raiju V3 Pro Samsung announces Galaxy XR headset Leica M EV1 – the first M-Camera with an integrated electronic viewfinder Micron Delivers Industry’s Highest Capacity SOCAMM2 for Low-Power DRAM in the AI Data Center KIOXIA launches EXCERIA PLUS G3 and EXCERIA G3 microSD cards for exceptional photography and video performance

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

 Researchers Discover New Smartphone Flaws

Researchers Discover New Smartphone Flaws

Smartphones Jul 31,2014 0

Security researchers have revealed two threats this week they say could put smartphones at risk of password theft or stolen data. The first vulnerability was discovered by Mathew Solnik, a mobile researcher with cyber security firm Accuvant. It
involves flaws in the way scores of manufacturers of Apple, Google Android and Blackberry devices have implemented an obscure industry standard that controls how everything from network connections to user identities are managed.

The threat could enable attackers to remotely wipe devices, install malicious software, access data and run applications on smartphones, Solnik said.

However, the threat remains remote to average users and that only mobile communications experts could be able to replicate the technique, Solnik added.

The second threat is affecting devices running older Android software. Unveiled by researchers at Bluebox Security, "Fake ID" allows malicious applications to trick software from Adobe, Google and others on Android devices without any user notification.

The "Fake ID" vulnerability is widespread in Android phones dating back to the January 2010 release of Android 2.1 software and affects all devices not patched by Google.

"Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability," Bluebox said in a statement referring to devices built before Google updated its core software late last year.

Tags:
Previous Post
Microsoft Releases New Limited Edition Wireless Mobile Mouse 3500 With Master Chief from Halo
Next Post
U.S. Government Issues Warning About Malicious Software

Related Posts

Latest News

Razer Unveils Raiju V3 Pro
Gaming

Razer Unveils Raiju V3 Pro

Samsung announces Galaxy XR headset
Consumer Electronics

Samsung announces Galaxy XR headset

Leica M EV1 – the first M-Camera with an integrated electronic viewfinder
Cameras

Leica M EV1 – the first M-Camera with an integrated electronic viewfinder

Micron Delivers Industry’s Highest Capacity SOCAMM2 for Low-Power DRAM in the AI Data Center
Enterprise & IT

Micron Delivers Industry’s Highest Capacity SOCAMM2 for Low-Power DRAM in the AI Data Center

KIOXIA launches EXCERIA PLUS G3 and EXCERIA G3 microSD cards for exceptional photography and video performance
Cameras

KIOXIA launches EXCERIA PLUS G3 and EXCERIA G3 microSD cards for exceptional photography and video performance

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed