Text message exploit can force your Nexus phone to reboot (updated)

Google Nexus 5

Watch out if someone sends a flood of text messages to your Nexus phone — they may be trying to break in or otherwise cause havoc. IT administrator Bogdan Alecu has discovered an Android bug that triggers exploitable behavior in the Galaxy Nexus, Nexus 4 and Nexus 5 whenever they’re hit by a large volume of Class 0 SMS messages, or texts that aren’t automatically stored on the phone. The denial of service attack usually forces the handset to reboot, but it can also disable the network connection (if temporarily) or crash the messaging app. Non-Nexus hardware appears to be safe, although Alecu notes that he hasn’t had a chance to test a wide variety of gadgets. Regardless of the problem’s scale, affected users will have to be cautious for a while; Google tells PCWorld that it’s looking into the exploit, but there’s no word on just when we can expect a patch.

Update: There’s already a firewall app in Google Play that protects against the exploit. Thanks, Chipsy4!

Filed under: , ,

Comments

PCWorld

Source: DefCamp, Google Play

A Guy Hacked Zuck’s Wall After Facebook Ignored His Bug Report

A Guy Hacked Zuck's Wall After Facebook Ignored His Bug Report

Khalil, a Palestinian white hat hacker, submitted bug reports to Facebook about a vulnerability that allowed him to post on anyone’s wall. But Facebook’s security team didn’t do anything. So Khalil wrote on Mark Zuckerberg’s wall about it and was generally a badass.

Read more…


    



Exploits leave some Android-based Bitcoin wallets open to theft

Exploits leave some Bitcoin wallet apps for Android open to theft

If you manage Bitcoins through Android devices, you may need to keep a close eye on your virtual cash in the near future. Developers have found that multiple Android-based Bitcoin apps, such as Bitcoin Wallet and Mycelium Wallet, are vulnerable to number generator exploits that could be used for theft. Although patched apps are either available in beta or coming soon, the complete fix involves more than just new code — users have to both create a new Bitcoin address and send it out to anyone still relying on old details. You’re safe if you use a simple Bitcoin exchange client, but you’ll otherwise want to visit the source link for more help with securing your digital holdings.

Filed under: , ,

Comments

Via: CNET

Source: Bitcoin

How to Safely Continue Using TOR on Windows

How to Safely Continue Using TOR on Windows

An attack against Tor Browser users on Windows machines was discovered this Sunday, and there is speculation that the uncovered malware was used by a law enforcement agency to harvest the IP addresses of users of several hidden services hosted by Freedom Hosting. The malware exploits a serious JavaScript security vulnerability affecting Firefox and other products that share the same code base, including the Tor Browser.

Read more…

    

Apple says iOS 7 will patch exploit that lets rogue chargers install malware

iOS 7 press shot

Recently, Georgia Tech researchers discovered an unusual way to attack iOS: a third-party charger with a hidden computer can install malware when an iOS device is plugged in and unlocked. That won’t be an issue for much longer, however, as Apple has confirmed that iOS 7 beta 4 and future releases contain a fix. While the company hasn’t said what that solution is, Georgia Tech’s Billy Lau says that the new OS can tell when it’s plugged into a computer instead of a charger — there shouldn’t be any rude surprises. The dependence on an iOS 7-based fix could leave many users vulnerable until the fall, although the hardware-specific nature of the exploit means it’s unlikely to be a major concern.

Filed under: , , ,

Comments

Source: Reuters

Millions Of Cell Phones Could Be Vulnerable To This SIM Card Hack

Millions Of Cell Phones Could Be Vulnerable To This SIM Card Hack

With the NSA leaks going full force it probably won’t sound like news at all that a German cryptographer claims to have hacked a SIM card. But that’s never been done before (as far as we know . . .) so it’s kind of a big deal, and shows that millions of phones are potentially vulnerable.

Read more…

    

Galaxy Note II info ticker, pop-up browser and ICE menu combo reveal another lock screen flaw (video)

Galaxy Note II info ticker, pop-up browser and ICE menu combo make for another lock screen flaw (video)

The emergency contacts (ICE) menu is proving to be a Pandora’s Box of lock screen vulnerabilities on several Samsung Galaxy handsets. Users are finding ways to exploit this weak point and the latest flaw that’s come to our attention employs the pop-up browser on the Note II as an accomplice. It requires the information ticker to be active (found in lock screen settings) so news bites and such are displayed on the screen you encounter when waking the device. Touch upon something to find out more and you’re sent to the lock screen; from there, head to the ICE menu to find a pop-up browser window containing the item you chose in the ticker. Within that window, anyone can access the handset’s clipboard or point the browser to sites holding personal data. Sure, it isn’t as bad as the bug that completely disables the lock screen — identified on the Galaxy S III, but also found to work on the Note II — but is just another reason to hope the mythical box is almost empty and at the bottom lies a fix.

Filed under: , , ,

Comments

Source: Ganesh’s Blog

Galaxy S III bug disables lock screen, grants full access, tests patience (updated)

Galaxy S III bug disables lock screen, grants full access, tests patience

Lock screens are around for a reason: to keep people from getting where they shouldn’t. They aren’t always infallible, though, and a few weeks ago, we saw a vulnerability in several builds of iOS 6 that granted access to the phone module without a passcode. Then, a couple of days ago, we reported on a Galaxy Note II bug that allows the quick-fingered to launch anything immediately behind the lock screen. Now, a similar flaw has been found on the Galaxy S III that breaks the lock screen altogether, permitting full use of the phone. To replicate the bug, you’ll need to tap the “Emergency Call” button on the lock screen, then go into the ICE (emergency contacts) menu. From there, press the home button, followed quickly by the power button, and that’s it. If successful, pressing the power button again will bring up the home screen straight away, and what’s more, the lock screen won’t return until the handset is restarted. Sounds worryingly simple, right? In our experience, not so much.

We first tried this method on an S III running Android 4.0.4 ICS, and a Note II for good measure, but to no avail. Then, we had a crack at an S III running 4.1.2 Jelly Bean, and were close to giving up trying to replicate it when voilà, it worked. We hoped to provide you with a video of the bug, but it must be camera shy. Despite literally hundreds of attempts in front of the lens and several more behind it, we’ve only managed it once — we found it impossible to nail down the correct timing between the home and power button pushes. Samsung’s likely aware of the bug already and when quizzed about the Note II vulnerability, said a fix for lock screen issues on affected “Galaxy devices” was in the works (read: they didn’t say the Note II specifically). We’ve reached out for comment just to be sure, but until a patch is provided, keep your phone concealed from nosey types who read tech sites and have saint-like patience.

Update: Samsung has responded, confirming a fix is indeed on its way:

“Samsung considers user privacy and the security of user data its top priority. We are aware of this issue and will release a fix at the earliest possibility.”

Filed under: , , ,

Comments

Via: SlashGear

Source: Full Disclosure

Galaxy Note II vulnerability lets attackers (briefly) access home screen apps (video)

Galaxy Note II vulnerability lets attackers briefly access home screen apps video

A security flaw discovered by Terence Eden on the Galaxy Note II with Android 4.1.2 may make that device less secure than you think when it’s locked by a code or other method. He discovered that the homescreen can be accessed, albeit it just for a split second, by pressing the “Emergency Call” icon, then the ICE button and finally pressing the physical home key for several seconds. While brief, it’s still enough time to click on any of your homescreen apps, which normally wouldn’t present a problem since access goes away when the home page disappears again. However, if one of your apps is a “direct dial” widget, for instance, a call can actually be placed by a hacker, and many other programs that perform an action at launch could also leave the device vulnerable. We’ve confirmed the flaw on our own handsets and the individual who discovered it says that after reporting it five days ago, Samsung has yet to respond. We’ve reached out to the Korean company ourselves and will let you know about any further developments.

Filed under: ,

Comments

Via: @Whatleydude (Twitter)

Source: Terence Eden (blog)

Samsung now pushing out more updates to address Exynos security vulnerability

Samsung now pushing out more updates to address Exynos security vulnerability

About two weeks ago, Samsung started rolling out a fix to help Galaxy S III owners in the UK with that previously acknowledged Exynos issue. Fast forward to today, and the Korean electronics giant is now delivering an over-the-air update to T-Mobile’s Galaxy Note II, which, according to the changelog, “improves security and provides bug fixes” to the famed handset. Meanwhile, Sprint, too, has pushed out a software update, though this one in particular being for the carrier’s Galaxy S II Epic Touch 4G — and it brings security updates that should take care of any existing Exynos vulnerabilities, plus there’s also the inclusion of “Sprint Connections Optimizer.” Surely, we can expect similar patches for more devices in the days to come, as we’re all well aware that Samsung’s working hard on solving the problem.

Filed under: , , ,

Comments

Via: Android Central

Source: Sprint, T-Mobile