Wednesday, September 26, 2012

Newest Samsung Galaxy S III Software Patches Remote Exploit Flaw

Samsung has confirmed reports that a remote reset exploit has been discovered that can remotely factory reset a user's smartphone through a USSD TEL code. This USSD TEL code could be triggered through malicious code in a website or WAP push SMS, wiping your phone without any prompts to intervene. The widely popular Samsung Galaxy S III, alongside a number of other TouchWiz devices, have been said to be vulnerable to the exploit. However, Samsung has acted quickly and has already created an update to solve the problem.

The company issued the following statement on the matter:
"We would like to assure our customers that the recent security issue concerning the Galaxy S III has already been resolved through a software update. We recommend all Galaxy S III customers download the latest software update, which can be done quickly and easily via the Over-The-Air (OTA) service." 
 It is always recommended to keep your phone and other gadgets up-to-date with the latest firmware, security updates ect. So if your Galaxy S3 phone is up-to-date, you shouldn't have anything to worry about. Unfortunately if you own one of Samsung's other device there may still be cause for concern as the company has made no mention about in their statement. So they could very well still be at risk from this latest vulnerability.

If you're uncertain as to whether or not your Samsung phone may be vulnerable to the USSD bug, you can check very quickly and easily with this USSD vulnerability test to see if you're protected or not.

No comments:

Post a Comment

All comments will be moderate for content, please be patient as your comment will appear as soon as it has been reviewed.

Thank you