Security Alert: Beware of SMS Messages That Can Take Control of Your Phone

Apr 20, 2009 by John Messina weblog

( -- Trust Digital has proven that an attacker with the right knowledge and toolkits can remotely hijack a phone by sending an SMS message to it. The attack would be most effective if it took place in the middle of the night while you are asleep.

The attack, on your phone, would start by receiving a that would automatically start up the and direct it to malicious Web site. The site would then download an executable file to the phone and steal all your personal data.

The following video demonstrates this:

This video is not supported by your browser at this time.

These attacks are real and can originate from any where in the world. Trust Digital recently announced software called EMM 8.0 that can help organizations protect employee phones from these types of attacks.

For detailed information about EMM 8.0 software, please visit the Trust Digital Web site.

© 2009

Explore further: Hand out money with my mobile? I think I'm ready

add to favorites email to friend print save as pdf

Related Stories

Foldable phone opens into large OLED screen

Nov 24, 2008

( -- A new cell phone developed by Samsung opens like a book to reveal a larger OLED screen, essentially turning the phone into a portable media player. Samsung recently demonstrated the prototype ...

Dell Talking About 80-Core Chip Processor

Nov 20, 2008

( -- This week Michael Dell (CEO of Dell) gave a slide presentation that included Intel´s recently developed 80-core processor. This isn't the first time that the 80-core chip was mentioned in ...

Computer Keyboard Hacking

Oct 22, 2008

( -- Swiss researchers from the Security and Cryptography Laboratory have demonstrated different ways of eavesdropping on wired keyboards from at least 11 different models. The keyboards range ...

HP Compaq Mini 700 Netbook Launched in Europe

Dec 23, 2008

( -- HP has launched their 10.2 inch netbook in Europe yesterday. The Compaq Mini incorporates a 1.6 GHz processor using an Intel Atom CPU along with an GMA950 graphics processor, with 1 GB of ...

Two Robot Chefs Make Omelets

Dec 04, 2008

( -- No "house of the future" is complete without a household robot to do the cooking and cleaning. Although today´s robots still have a ways to go before substituting for a real live-in maid, ...

Recommended for you

Hand out money with my mobile? I think I'm ready

10 hours ago

A service is soon to launch in the UK that will enable us to transfer money to other people using just their name and mobile number. Paym is being hailed as a revolution in banking because you can pay peopl ...

Quantenna promises 10-gigabit Wi-Fi by next year

Apr 16, 2014

( —Quantenna Communications has announced that it has plans for releasing a chipset that will be capable of delivering 10Gbps WiFi to/from routers, bridges and computers by sometime next year. ...

Tech giants look to skies to spread Internet

Apr 16, 2014

The shortest path to the Internet for some remote corners of the world may be through the skies. That is the message from US tech giants seeking to spread the online gospel to hard-to-reach regions.

Wireless industry makes anti-theft commitment

Apr 16, 2014

A trade group for wireless providers said Tuesday that the biggest mobile device manufacturers and carriers will soon put anti-theft tools on the gadgets to try to deter rampant smartphone theft.

Dish Network denies wrongdoing in $2M settlement

Apr 15, 2014

The state attorney general's office says Dish Network Corp. will reimburse Washington state customers about $2 million for what it calls a deceptive surcharge, but the satellite TV provider denies any wrongdoing.

Netflix's Comcast deal improves quality of video

Apr 14, 2014

Netflix's videos are streaming through Comcast's Internet service at their highest speeds in the past 17 months now that Netflix is paying for a more direct connection to Comcast's network.

User comments : 8

Adjust slider to filter visible comments by rank

Display comments: newest first

5 / 5 (3) Apr 20, 2009
Hackers in your phone, stealing your data, buy our software now!

Trust Digital probably developped those hacks (if they are even real) so they can scare people into buying their software.

This could have been an interesting article if it provided all the crucial details like which phones are vulnerable, how the manufacturers reacted and how to download a patch. As it is this is just an ad for this shitty company which want's to profit from this vulnerability and peoples fear, too bad physorg posts such crap.
1 / 5 (2) Apr 20, 2009
Yet another Microsoft security success story.
2.3 / 5 (3) Apr 20, 2009
Of course they developed them, and how nice of them to create video's to teach everyone else how to do this so that you have to buy their software to protect yourself.

In the old days the mobs ran this racket, they called it "protection" just like Trust Digital does

"Trust Digital recently announced software called EMM 8.0 that can help organizations PROTECT employee phones from these types of attacks"
not rated yet Apr 22, 2009
I agree this is just a marketing ploy. But what does Microsoft have to do with the issue? Earls, haven't had your MS-bashing fix for today yet?
not rated yet Apr 25, 2009
Microsoft has everything to do with the issue. The phone on the left runs software developed by Microsoft. They left the holes open!
not rated yet Apr 26, 2009

EdP said it all.
not rated yet Aug 07, 2009
yeh thats funny as ...but i think this could happen guys ...u now wat u do ? u just dont buy the software and wait until it happens then .... then u start complianing
not rated yet Aug 23, 2009
No...not my personal information! Is no contact list safe? ....Fear certainly has many shoving fuel into its furnace of oppression.

More news stories

Hackathon team's GoogolPlex gives Siri extra powers

( —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Better thermal-imaging lens from waste sulfur

Sulfur left over from refining fossil fuels can be transformed into cheap, lightweight, plastic lenses for infrared devices, including night-vision goggles, a University of Arizona-led international team ...

Deadly human pathogen Cryptococcus fully sequenced

Within each strand of DNA lies the blueprint for building an organism, along with the keys to its evolution and survival. These genetic instructions can give valuable insight into why pathogens like Cryptococcus ne ...