Monday, December 2, 2013

They discover a bug that allows block remotely Nexus 5 ... - ElEconomista.es

menéame

Europa Press

12/02/2013 – 12:52

Note

users: 10.0 ( 1 votes)

  • Also in the Galaxy Nexus and Nexus 4

nexus-5-4.jpg

kiosco
  • E-mail
  • Subscribe to newsletter

  • Print
  • Increase text
  • Reduce text
  • Dixio Double click on a word to see its signifcado
  • sudoku Sudoku: Play every day to a new one
  • Tiempo Weather : Check the forecast for your city

Eco Tablet Free in App Store

ecoTablet

‘s most complete information platform for iPad and economic services.

A security expert has discovered a vulnerability affecting the Galaxy Nexus, Nexus Nexus 4 and 5 causing blocking or restart the terminal as well as loss of the network connection. The bug in Android Ice Cream Sandwich, Jelly Bean and KitKat and manifests through messages SMS Class 0 or Flash SMS.

The vulnerability has been discovered by a system administrator and security expert named Bogdan Alecu Levi9 company as PC World has collected . Apparently, the error is that these messages are displayed directly on the screen of the device, not stored in the terminal without any notification.

not rule MSS and a new one arrives, it overlaps, and so on, so that the user does not notice that receives messages unless you constantly look at the phone screen. . When a lot of these messages about Flash-30 is reached – and the user does not rule, the Nexus devices may crash, reboot, or even lose your network connection

Alecu gave a demonstration of this bug in DefCamp security conference in which successive messages to send to a Nexus 4 Android 4.3 device anomalous behavior was not responding to commands.

Although it is very unusual to receive large amounts of Class 0 messages, this method could be used by cybercriminals as a way to lock the phone and connections without the user noticing.

  • Flash
  • Seleccion eE
  • Technology
  • Gadgets

ADVERTISING

– Save yourself committing custody and brokerage account opened in Self Bank.

No comments:

Post a Comment