Security Alert: Beware of SMS Messages That Can Take Control of Your Phone

Apr 20, 2009 by John Messina weblog

(PhysOrg.com) -- Trust Digital has proven that an attacker with the right knowledge and toolkits can remotely hijack a phone by sending an SMS message to it. The attack would be most effective if it took place in the middle of the night while you are asleep.

The attack, on your phone, would start by receiving a that would automatically start up the and direct it to malicious Web site. The site would then download an executable file to the phone and steal all your personal data.

The following video demonstrates this:

This video is not supported by your browser at this time.

These attacks are real and can originate from any where in the world. Trust Digital recently announced software called EMM 8.0 that can help organizations protect employee phones from these types of attacks.

For detailed information about EMM 8.0 software, please visit the Trust Digital Web site.

© 2009 PhysOrg.com

Explore further: Scientists twist radio beams to send data: Transmissions reach speeds of 32 gigabits per second

add to favorites email to friend print save as pdf

Related Stories

Foldable phone opens into large OLED screen

Nov 24, 2008

(PhysOrg.com) -- A new cell phone developed by Samsung opens like a book to reveal a larger OLED screen, essentially turning the phone into a portable media player. Samsung recently demonstrated the prototype ...

Dell Talking About 80-Core Chip Processor

Nov 20, 2008

(PhysOrg.com) -- This week Michael Dell (CEO of Dell) gave a slide presentation that included Intel´s recently developed 80-core processor. This isn't the first time that the 80-core chip was mentioned in ...

Computer Keyboard Hacking

Oct 22, 2008

(PhysOrg.com) -- Swiss researchers from the Security and Cryptography Laboratory have demonstrated different ways of eavesdropping on wired keyboards from at least 11 different models. The keyboards range ...

HP Compaq Mini 700 Netbook Launched in Europe

Dec 23, 2008

(PhysOrg.com) -- HP has launched their 10.2 inch netbook in Europe yesterday. The Compaq Mini incorporates a 1.6 GHz processor using an Intel Atom CPU along with an GMA950 graphics processor, with 1 GB of ...

Two Robot Chefs Make Omelets

Dec 04, 2008

(PhysOrg.com) -- No "house of the future" is complete without a household robot to do the cooking and cleaning. Although today´s robots still have a ways to go before substituting for a real live-in maid, ...

Recommended for you

Oculus unveils new prototype VR headset

Sep 20, 2014

Oculus has unveiled a new prototype of its virtual reality headset. However, the VR company still isn't ready to release a consumer edition.

Wireless sensor transmits tumor pressure

Sep 20, 2014

The interstitial pressure inside a tumor is often remarkably high compared to normal tissues and is thought to impede the delivery of chemotherapeutic agents as well as decrease the effectiveness of radiation ...

Tim Cook puts personal touch on iPhone 6 launch

Sep 20, 2014

Apple chief Tim Cook personally kicked off sales of the iPhone 6, joining in "selfies" and shaking hands with customers Friday outside the company's store near his Silicon Valley home.

User comments : 8

Adjust slider to filter visible comments by rank

Display comments: newest first

superhuman
5 / 5 (3) Apr 20, 2009
Hackers in your phone, stealing your data, buy our software now!

Trust Digital probably developped those hacks (if they are even real) so they can scare people into buying their software.

This could have been an interesting article if it provided all the crucial details like which phones are vulnerable, how the manufacturers reacted and how to download a patch. As it is this is just an ad for this shitty company which want's to profit from this vulnerability and peoples fear, too bad physorg posts such crap.
earls
1 / 5 (2) Apr 20, 2009
Yet another Microsoft security success story.
jonnyboy
2.3 / 5 (3) Apr 20, 2009
Of course they developed them, and how nice of them to create video's to teach everyone else how to do this so that you have to buy their software to protect yourself.

In the old days the mobs ran this racket, they called it "protection" just like Trust Digital does

"Trust Digital recently announced software called EMM 8.0 that can help organizations PROTECT employee phones from these types of attacks"
Arn
not rated yet Apr 22, 2009
I agree this is just a marketing ploy. But what does Microsoft have to do with the issue? Earls, haven't had your MS-bashing fix for today yet?
EdP
not rated yet Apr 25, 2009
Microsoft has everything to do with the issue. The phone on the left runs software developed by Microsoft. They left the holes open!
earls
not rated yet Apr 26, 2009
"DUR DUR DUR WAT DUZ MACROSOFT HAF TWO DEW WIF DIS?!!"

EdP said it all.
knobface
not rated yet Aug 07, 2009
yeh thats funny as ...but i think this could happen guys ...u now wat u do ? u just dont buy the software and wait until it happens then .... then u start complianing
ubiquitous
not rated yet Aug 23, 2009
No...not my personal information! Is no contact list safe? ....Fear certainly has many shoving fuel into its furnace of oppression.