Vulnerability which eliminates upgrade allows attackers to format another smartphone. For this potential attacker must force the owner to open the device in a mobile browser Web page that contains malicious code. Code can also be sent via NFC or encrypt a barcode.
Sample code that, when integrated into the code of web pages, "makes" smart phone back to factory settings and delete all user data, resulting in his Twitter researcher Pau Oliva.
Media was told that the vulnerability is present in smartphones with the "shell" TouchWiz. These include, in addition to Galaxy S III, include Galaxy S II, Galaxy S Advance, Galaxy Ace and other devices. Did the update for these devices, Samsung did not specify.
No comments:
Post a Comment