Security Alert: Beware of SMS Messages That Can Take Control of Your Phone

Apr 20, 2009 by John Messina weblog

(PhysOrg.com) -- Trust Digital has proven that an attacker with the right knowledge and toolkits can remotely hijack a phone by sending an SMS message to it. The attack would be most effective if it took place in the middle of the night while you are asleep.

The attack, on your phone, would start by receiving a that would automatically start up the and direct it to malicious Web site. The site would then download an executable file to the phone and steal all your personal data.

The following video demonstrates this:

This video is not supported by your browser at this time.

These attacks are real and can originate from any where in the world. Trust Digital recently announced software called EMM 8.0 that can help organizations protect employee phones from these types of attacks.

For detailed information about EMM 8.0 software, please visit the Trust Digital Web site.

© 2009 PhysOrg.com

Explore further: Studying the speed of multi-hop Bluetooth networks

add to favorites email to friend print save as pdf

Related Stories

Foldable phone opens into large OLED screen

Nov 24, 2008

(PhysOrg.com) -- A new cell phone developed by Samsung opens like a book to reveal a larger OLED screen, essentially turning the phone into a portable media player. Samsung recently demonstrated the prototype ...

Dell Talking About 80-Core Chip Processor

Nov 20, 2008

(PhysOrg.com) -- This week Michael Dell (CEO of Dell) gave a slide presentation that included Intel´s recently developed 80-core processor. This isn't the first time that the 80-core chip was mentioned in ...

Computer Keyboard Hacking

Oct 22, 2008

(PhysOrg.com) -- Swiss researchers from the Security and Cryptography Laboratory have demonstrated different ways of eavesdropping on wired keyboards from at least 11 different models. The keyboards range ...

HP Compaq Mini 700 Netbook Launched in Europe

Dec 23, 2008

(PhysOrg.com) -- HP has launched their 10.2 inch netbook in Europe yesterday. The Compaq Mini incorporates a 1.6 GHz processor using an Intel Atom CPU along with an GMA950 graphics processor, with 1 GB of ...

Two Robot Chefs Make Omelets

Dec 04, 2008

(PhysOrg.com) -- No "house of the future" is complete without a household robot to do the cooking and cleaning. Although today´s robots still have a ways to go before substituting for a real live-in maid, ...

Recommended for you

End to end 5G for super, superfast mobile

Nov 24, 2014

A collaboration between NEC Electronics Samsung and several academic centres in China and Iran, is investigating how software-defined cellular networking might be used to give smart phone users the next generation of super-superfast ...

German study supports free "Super WiFi"

Nov 24, 2014

The need for the wireless transfer of data will increase significantly in the coming years. Scientists at the Karlsruhe Institute of Technology (KIT) therefore propose to turn some of the TV frequencies that ...

User comments : 8

Adjust slider to filter visible comments by rank

Display comments: newest first

superhuman
5 / 5 (3) Apr 20, 2009
Hackers in your phone, stealing your data, buy our software now!

Trust Digital probably developped those hacks (if they are even real) so they can scare people into buying their software.

This could have been an interesting article if it provided all the crucial details like which phones are vulnerable, how the manufacturers reacted and how to download a patch. As it is this is just an ad for this shitty company which want's to profit from this vulnerability and peoples fear, too bad physorg posts such crap.
earls
1 / 5 (2) Apr 20, 2009
Yet another Microsoft security success story.
jonnyboy
2.3 / 5 (3) Apr 20, 2009
Of course they developed them, and how nice of them to create video's to teach everyone else how to do this so that you have to buy their software to protect yourself.

In the old days the mobs ran this racket, they called it "protection" just like Trust Digital does

"Trust Digital recently announced software called EMM 8.0 that can help organizations PROTECT employee phones from these types of attacks"
Arn
not rated yet Apr 22, 2009
I agree this is just a marketing ploy. But what does Microsoft have to do with the issue? Earls, haven't had your MS-bashing fix for today yet?
EdP
not rated yet Apr 25, 2009
Microsoft has everything to do with the issue. The phone on the left runs software developed by Microsoft. They left the holes open!
earls
not rated yet Apr 26, 2009
"DUR DUR DUR WAT DUZ MACROSOFT HAF TWO DEW WIF DIS?!!"

EdP said it all.
knobface
not rated yet Aug 07, 2009
yeh thats funny as ...but i think this could happen guys ...u now wat u do ? u just dont buy the software and wait until it happens then .... then u start complianing
ubiquitous
not rated yet Aug 23, 2009
No...not my personal information! Is no contact list safe? ....Fear certainly has many shoving fuel into its furnace of oppression.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.