Google G1 Phone: Security Flaw Exposed

October 28, 2008 by John Messina weblog
Google Android G1 Phone

(PhysOrg.com) -- A group of Security Researchers exposed a security flaw in Google´s G1 Android phone. The flaw is in the web browser on the T-Mobile G1 that can potentially allow Trojans and Keyloggers to install themselves on your phone if you visit a website with malicious code.

Android, Google's open source software is based on outdated open-source components which had know vulnerabilities and were fixed. Google admitted that they did not incorporate the security fixes into Android.

For Google´s G1 phone to become infected, a malicious developer would need to know what the flaw is and then needs to place this malicious code on a website. Unless you are searching for suspicious websites that may be affected, the chances are good that you are safe from infection.

Google said it is developing a solution to the problem. "We are working with T-Mobile to include a fix for the browser exploit, which will soon be delivered over the air to all devices, and have addressed this in the Android open-source platform.

This incident raises concerns about potential difficulties that the Android community might face in the future. Because Google has adopted an open model with Android, many vendors and operators in the future may offer a variety of phones. If vulnerabilities are found in the future, phone makers and operators will have to determine if their version of the software is affected and then coordinate the distribution of a fix to all users.

Explore further: Study highlights serious security threat to many internet users

Related Stories

Researcher says flaw in Android creates phone risk (Update)

September 28, 2012

Cellphones using Google's Android operating system are at risk of being disabled or wiped clean of their data, including contacts, music and photos, because of a security flaw that was discovered several months ago but went ...

Security CTO to detail Android Fake ID flaw at Black Hat

July 29, 2014

Where have you heard this before: A team of security researchers discover a security flaw in Android devices. This is, however, news. This time, experts are talking about a flaw that involves a widespread vulnerability dating ...

Linux kernel vulnerability traced to keyring implementation

January 21, 2016

Security watchers this week focused on the zero-day vulnerability which was found inside the Linux kernel. Geektime's Gabriel Avner and Yaneev Avital reported Tuesday that the Israeli cyber security firm Perception Point ...

Android uh-oh resides in vulnerability dubbed Certifi-gate

August 7, 2015

An Android vulnerability has been discovered which leaves phones at risk of malicious apps gaining privileged access without a victim being aware of all this. The weakness affects phones from a number of major manufacturers. ...

Recommended for you

Inferring urban travel patterns from cellphone data

August 29, 2016

In making decisions about infrastructure development and resource allocation, city planners rely on models of how people move through their cities, on foot, in cars, and on public transportation. Those models are largely ...

How machine learning can help with voice disorders

August 29, 2016

There's no human instinct more basic than speech, and yet, for many people, talking can be taxing. 1 in 14 working-age Americans suffer from voice disorders that are often associated with abnormal vocal behaviors - some of ...

Apple issues update after cyber weapon captured

August 26, 2016

Apple iPhone owners on Friday were urged to install a quickly released security update after a sophisticated attack on an Emirati dissident exposed vulnerabilities targeted by cyber arms dealers.

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.