Find a Question:
Interception Management Android smartphone via a viral SMS
Two weeks ago, experts talked about how one MMS-message can hack Android-smartphone. Today, at a conference on security research team demonstrated how to take control smartphone using the counterfeit application or a simple SMS. The problem lies in the mobile remote support tool. This application is often set by the manufacturer to ensure that the company’s specialists were able to help the user understand the problem occurred on a smartphone. With it, service support has full access to the device and can control it remotely. No icons on your desktop with this application is not found. A group of researchers under the name Check Point demonstrated how to use a forged certificate, you can get full access to this application. To do this, there are two ways: installing fake user applications (for example, a flashlight), or sending the unit sacrifices SMS, which will cause the remote control tool to execute any command. Check Point has announced the vulnerability of Google many manufacturers of smart phones, which will have to take measures to eliminate this dangerous “holes” in their software. In addition, the store Google Play published scanner that will allow to know whether installed on the smartphone application remotely.Viewing:-170
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!