Android security flaw puts phones at risk

0 Comment(s)Print E-mail Shanghai Daily, September 30, 2012
Adjust font size:

Cellphones using Google's Android operating system are at risk of being disabled or wiped clean of their data, including contacts, music and photos, because of a security flaw that was discovered several months ago but went unnoticed until now.

Android security flaw puts phones at risk.[File photo]

Android security flaw puts phones at risk.[File photo] 

Opening a link to a website or a mobile application embedded with malicious code can trigger an attack capable of destroying the memory card in Android-equipped handsets made by Samsung, HTC, Motorola and Sony Ericsson, rendering the devices useless, computer security researcher Ravi Borgaonkar wrote in a blog post on Friday. Another code that can erase a user's data by performing a factory reset of the device appears to target only the newly released and top-selling Galaxy S III and other Samsung phones, he wrote.

Borgaonkar informed Google of the vulnerability in June, he said. A fix was issued quickly, he said, but it wasn't publicized, leaving smartphone owners largely unaware that the problem existed and how they could fix it.

Google declined to comment. Android debuted in 2008 and now dominates the smartphone market. Nearly 198 million smartphones using Android were sold in the first six months of 2012, according to the research firm IDC. About 243 million Android-equipped phones were sold in 2011, IDC said.

Versions of Android that are vulnerable include Gingerbread, Ice Cream Sandwich and Jelly Bean, according to Borgaonkar. He said the Honeycomb version of Android, designed for tablets, needs to be tested to determine if it is at risk as well.

Samsung, which makes most of the Android phones, said only early production models of the Galaxy S III were affected and a software update has been issued for that model.

The company said it is conducting an internal review to determine if other devices are affected and what, if any, action is needed.

Borgaonkar, a researcher at Germany's Technical University Berlin, said the bug works by taking advantage of functions in phones that allow them to dial a telephone number directly from a web browser. That convenience comes with risk, however. A hacker, or anyone with ill intent, can create a website or an app with codes that instruct the phones linking to those numbers to execute commands automatically, such as a full factory reset.

Print E-mail Bookmark and Share

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 四虎影永久在线观看精品| 国产精品模特hd在线| 久久中文字幕2021精品| 欧美乱人伦中文字幕在线不卡| 人人鲁人人莫人人爱精品 | 亚洲ⅴ国产v天堂a无码二区| 水蜜桃视频在线免费观看| 免费一级成人毛片| 精品少妇ay一区二区三区| 国产一区二区精品久久岳√| 香蕉视频黄色在线观看| 国产永久免费高清在线观看视频| 2021久久精品国产99国产精品 | 一本色道无码道在线观看| 扒开美妇白臀扒挺进在线视频| 久久国产一区二区三区| 最新国产三级在线不卡视频| 亚洲六月丁香六月婷婷蜜芽| 欧美精品国产综合久久| 亚洲精品高清国产麻豆专区| 男人天堂999| 免费一级毛片在播放视频| 精品亚洲成a人无码成a在线观看| 啦啦啦中文在线视频6| 蜜桃视频在线观看免费网址入口| 国产大片黄在线观看| 久草视频在线网| 国产熟睡乱子伦视频在线播放| 香蕉视频网站在线| 国产精品露脸国语对白| 91福利视频免费观看| 国内精品福利在线视频| 97精品人妻系列无码人妻| 在线观看一二三区| 99精品国产99久久久久久97| 天天干天天爽天天射| jizz国产在线观看| 天天干天天色天天| ass亚洲**毛茸茸pics| 天堂资源在线官网| eeuss影院机在线播放|