Android phones can be hacked with a simple text!!!!!!!It can take over your camera | |
Anonymous Coward (OP) User ID: 61974406 United States 07/27/2015 01:32 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 61974406 United States 07/27/2015 01:33 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 61974406 United States 07/27/2015 01:34 PM Report Abusive Post Report Copyright Violation | The weaknesses reside in Stagefright, a media playback tool in Android. They are all “remote code execution” bugs, allowing malicious hackers to infiltrate devices and exfiltrate private data. All attackers would need to send out exploits would be mobile phone numbers, Drake noted. From there, they could send an exploit packaged in a Stagefright multimedia message (MMS), which would let them write code to the device and steal data from sections of the phone that can be reached with Stagefright’s permissions. That would allow for recording of audio and video, and snooping on photos stored in SD cards. Bluetooth would also be hackable via Stagefright. [link to www.forbes.com] |
eekers
Dreamer of Dreams User ID: 63577683 United States 07/27/2015 01:35 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 61974406 United States 07/27/2015 01:37 PM Report Abusive Post Report Copyright Violation | Odd charges on cellphone statements Unusual data access patterns Rapid battery life failure Apps downloaded from third-party stores [link to www.darkreading.com] |
Anonymous Coward (OP) User ID: 61974406 United States 07/27/2015 01:37 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 69885100 United States 07/27/2015 01:37 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 61974406 United States 07/27/2015 01:39 PM Report Abusive Post Report Copyright Violation | The MMS attack vector is the scariest of all because it doesn’t require any interaction from the user; the phone just needs to receive a malicious message. For example, the attacker could send the malicious MMS when the victim is sleeping and the phone’s ringer is silenced, Drake said. After exploitation the message can be deleted, so the victim will never even know that his phone was hacked, he said. The researcher didn’t just find the vulnerabilities, but actually created the necessary patches and shared them with Google in April and early May. The company took the issues very seriously and applied the patches to its internal Android code base within 48 hours, he said. That code gets shared in advance with device manufacturers that are in the Android partnership program, before it’s released publicly as part of the Android Open Source Project (AOSP). Unfortunately, due to the generally slow pace of Android updates, over 95 percent of Android devices are still affected, Drake estimates. [link to www.pcworld.com] |
Anonymous Coward User ID: 69794435 United Kingdom 07/27/2015 01:44 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1890810 07/27/2015 02:02 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 50907268 Netherlands 07/27/2015 02:29 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 69891647 Thailand 07/28/2015 01:17 AM Report Abusive Post Report Copyright Violation | |