protecting your cyber world!
 
DO WE RELY TOO MUCH ON THE TECH IN OUR POCKET AND HOMES?

DO WE RELY TOO MUCH ON THE TECH IN OUR POCKET AND HOMES?

DO WE RELY TOO MUCH ON THE TECH IN OUR POCKET AND HOMES?

New exploit turns Samsung Galaxy phones into remote bugging devices As many as 600 million phones vulnerable to remote code execution attack

As many as 600 million Samsung phones may be vulnerable to attacks that allow hackers to surreptitiously monitor the camera and microphone, read incoming and outgoing text messages, and install malicious apps, a security researcher said. The vulnerability is in the update mechanism for a Samsung-customized version of SwiftKey, available on the Samsung Galaxy S6, S5, and several other Galaxy models. When downloading updates, the Samsung devices don’t encrypt the executable file, making it possible for attackers in a position to modify upstream traffic—such as those on the same Wi-Fi network—to replace the legitimate file with a malicious payload. The exploit was demonstrated Tuesday at the Blackhat security conference in London by Ryan Welton, a researcher with security firm NowSecure. A video of his exploit is here.

What are your thoughts?

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Mobile PC Rescue

Subscribe now to keep reading and get access to the full archive.

Continue reading