Charlie Miller scuffed virtual at the Black Hat Security Conference, Apple and Android hackers cash or using near field communication functions like them, might be Nick all the data from your phone showed method.
By and according to the New York Times, responsible for controlling all Android and Nokia mobile phone completely but is bringing in simply just some different device or target gadget inches within chip Miller.
Work of mirror security company Accuvant, gets funds Pentagon research arm Defense Advanced research projects Agency (DARPA __.
You can load a url that contains a chip tags Flash he is all you need to do (NFC) Nexus S Android phone next working, have functionality via mobile browser calls the beam of the Google Android.
Can hit complete control of the device another vulnerability in the mobile browser via illegal websites from there.
[Nick of the information stored on the SD card of the mobile phone is a simple matter. Like you can install the software to monitor the movement and communication.
Someone is opposite of it in a crowded room only is brushing.
Miller said the Android beams designed playing games that share the something in the map on the web page or. However, a huge security hole.
Is the browser vulnerability was corrected mirror Android version 4.1, does not update the many people. The fact that Android users not upgrade to the latest version of the operating system, 90% is no longer.
Miller was pretty busy. Also, he has to send Word documents in word processor for the mobile phones, to control the device crafted vulnerability using maliciously shared features Nokia N9 1' I used s NFC content.
All mobile device trust the good day.
No comments:
Post a Comment