http://consumerist.com/2015/07/27/b...e-over-your-android-phone-with-a-single-text/
http://fortune.com/2015/07/28/stagefright-google-android-security/
This is a pretty nasty bug, you can be infected without even opening the text message. Google has patched the bug, but it's up to the manufacturers to release the updates. Bad news for those devices that are no longer being supported by their manufacturers.
http://fortune.com/2015/07/28/stagefright-google-android-security/
This is a pretty nasty bug, you can be infected without even opening the text message. Google has patched the bug, but it's up to the manufacturers to release the updates. Bad news for those devices that are no longer being supported by their manufacturers.
That means an attacker can infect your device simply by sending you a malicious MMS message. (Remember that acronym? Multimedia message service.) In fact, a victim doesn’t even have to open a booby-trapped message for the attack to spring. Once the message received, your phone is toast.
The level of access attackers would gain would allow access to files stored on SD cards as well as on the phone memory. Attackers could also turn your phone into a bug, remotely recording audio and video without your knowledge. Bluetooth access is also hackable via Stagefright. All versions of Android from 2.2 and up are considered vulnerable.
If that sounds terrifying, well, it kind of is. And then it gets worse. The exploit isn’t like a virus-laden e-mail attachment; you don’t actually have to try to view the media in order to be affected. Merely looking at the message in some apps is enough.
And then there are the apps where you don’t even have to open the message: for folks who use Google Hangouts to read their texts, Hangouts would open and access the exploit code “immediately before you even look at your phone… before you even get the notification,” Drake told Forbes, adding that it’s possible then to delete the message before the user even receives an alert, making the attack completely silent.
Last edited: