Smart phone security Exposure new issue: May involve 2 billion parts
Developer on Alibaba Coud: Build your first app with APIs, SDKs, and tutorials on the Alibaba Cloud. Read more ＞
Perhaps it has never experienced a massive attack, and the security of smartphones has never seemed to be seriously elevated to the public perception level, at least relative to PC security. But smartphones are clearly more exposed to security issues-smartphones are devices that connect to the Internet in real time and update and store large amounts of privacy data on a regular basis, which can easily be targeted by hackers. Of course, this is only a theoretical level. But a recent report by the Wall Street Journal, which describes the researchers ' findings on technology, may be a real boost to vigilance, since it could reach 2 billion of smartphones around the world. Mathew Solnik, a cell phone researcher at Accuvant, a cyber-security firm, said he could unwittingly invade a smartphone 30 feet away, including hacking into his calls, browsing contacts, and even reading text messages. Solnik said they had probably figured out a way to disguise a wireless operator with a smartphone flaw in radio--using a virtual signal tower of less than 1000 dollars and laptop size to upload malicious code within a 30-foot range of phones. It is reported that solnik this intrusion mode can be run on the BlackBerry and the Android operating system, as well as an earlier version of the iOS system. However, Solnik stressed that Accuvant's discovery of the loophole is not yet likely to pose a threat to public users, as only a handful of mobile communications experts around the world have mastered the technology. But once the technical details are released, the security risks will spread across the globe. Researchers at another security company, Blunebox, also found a security vulnerability--fakeid that any application that relies on the verification signature chain on Android could be affected by the vulnerability, Reuters reported. Currently, Google has said that there is no evidence that people use the fake ID for hacking activities, the company will release the patch as soon as possible. Patch upgrade work is obviously a tricky problem, it depends not only on the system developers do not send, but also depends on the user terminal does not upgrade, can upgrade. If iOS devices can be relatively unified security upgrades, then Android is clearly a problem, Google is difficult to the fragmented version of the Android software update, it relies more on third-party vendors, and those who stay in the old version of the Android will become a huge risk. It is reported that this fake ID loophole can be traced back to the January 2010 launch of the Android 2.1 system. Next week, the security of smartphones will be discussed as an important issue at the Black Hat Safety conference in Blackhat conference. Solnik and other researchers will demonstrate the hacker technology of smartphones, which is expected to push smartphones to new positions on the web's security.
This article is an English version of an article which is originally in the Chinese language on aliyun.com and is provided for information purposes only. This website makes no representation or warranty of any kind, either expressed or implied, as to the accuracy, completeness ownership or
reliability of the article or any translations thereof. If you have any concerns or complaints relating to the article, please send an email, providing a detailed description of the concern or
complaint, to email@example.com. A staff member will contact you within 5 working days. Once verified, infringing content will be removed immediately.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
and provide relevant evidence. A staff member will contact you within 5 working days.