- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sounds like uneasy situation if you have one of these Devices especially with the older Soft wear..
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sorry missed your post... Here is a more detailed update on what devices may be infected.... http://www.slashgear.com/samsung-galaxy-s-iii-remote-data-wipe-hack-discovered-25249061/
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for the Info,, Wildman b
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It happens on stock android as well. It isn't specific to Samsung devices. It was patched as of 4.0.4 straight from Google, but any device before 4.0.4 has to be done by the manufacturer. whether a hotfix patch or updated to 4.0.4.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for the info as well Tidbits this helps one's understand the OS a little more including me glad You and Wildman Chimed in. b
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Actually Tidbit the Samsung S3 has 4.0.4 and it still seems to have this issue unpatched, it has been verified that only the international version of the S3 picked up the need patch...
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That's because Samsung uses their own dialer instead of a skinned dialer iirc. If you use a stock for example the Galaxy Nexus on anything older than 4.0.4 it would have the issues. I just pointing out it wasn't specific to Samsung.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ah OK.... By the way I found another way to protect a device from this issue.. I installed a app called TelStop from https://play.google.com/store/apps/details?id=org.mulliner.telstop&feature=nav_result#?t=W251bGwsMSw... that block and codes that try to access dialer.. Seems to work well..
Description
This is a quick fix for the USSD TEL attacks described here [1].
The tool works through publishing a URI handler for TEL. Every time a TEL URI is activated an application selector will be shown. If you suddenly see the application selector that includes Phone and TelStop you know something just invoked a TEL URI. If you didn't click a TEL link or tried to dial a number it is likely to be an attack. To check out the URI just select TelStop.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just learned that S3 recent G7 update closed this security issue, so the device should not have a chance of a hard rest from this exploit... Read about it at http://phandroid.com/2012/09/26/samsung-says-remote-wipe-hack-already-addressed-in-recent-galaxy-s3-...