Security Alert: Beware of SMS Messages That Can Take Control of Your Phone

April 20, 2009 by John Messina, Phys.org weblog

(PhysOrg.com) -- Trust Digital has proven that an attacker with the right knowledge and toolkits can remotely hijack a phone by sending an SMS message to it. The attack would be most effective if it took place in the middle of the night while you are asleep.

The attack, on your phone, would start by receiving a that would automatically start up the and direct it to malicious Web site. The site would then download an executable file to the phone and steal all your personal data.

The following video demonstrates this:

These attacks are real and can originate from any where in the world. Trust Digital recently announced software called EMM 8.0 that can help organizations protect employee phones from these types of attacks.

For detailed information about EMM 8.0 software, please visit the Trust Digital Web site.

© 2009 PhysOrg.com

Explore further: Foldable phone opens into large OLED screen

Related Stories

Foldable phone opens into large OLED screen

November 24, 2008

(PhysOrg.com) -- A new cell phone developed by Samsung opens like a book to reveal a larger OLED screen, essentially turning the phone into a portable media player. Samsung recently demonstrated the prototype at the FPD International ...

Dell Talking About 80-Core Chip Processor

November 20, 2008

(PhysOrg.com) -- This week Michael Dell (CEO of Dell) gave a slide presentation that included Intel´s recently developed 80-core processor. This isn't the first time that the 80-core chip was mentioned in a conference.

Computer Keyboard Hacking

October 22, 2008

(PhysOrg.com) -- Swiss researchers from the Security and Cryptography Laboratory have demonstrated different ways of eavesdropping on wired keyboards from at least 11 different models. The keyboards range from the latest ...

HP Compaq Mini 700 Netbook Launched in Europe

December 23, 2008

(PhysOrg.com) -- HP has launched their 10.2 inch netbook in Europe yesterday. The Compaq Mini incorporates a 1.6 GHz processor using an Intel Atom CPU along with an GMA950 graphics processor, with 1 GB of RAM.

Two Robot Chefs Make Omelets

December 4, 2008

(PhysOrg.com) -- No "house of the future" is complete without a household robot to do the cooking and cleaning. Although today´s robots still have a ways to go before substituting for a real live-in maid, researchers are ...

Recommended for you

Printing microelectrode array sensors on gummi candy

June 22, 2018

Microelectrodes can be used for direct measurement of electrical signals in the brain or heart. These applications require soft materials, however. With existing methods, attaching electrodes to such materials poses significant ...

EU copyright law passes key hurdle

June 20, 2018

A highly disputed European copyright law that could force online platforms such as Google and Facebook to pay for links to news content passed a key hurdle in the European Parliament on Wednesday.

6 comments

Adjust slider to filter visible comments by rank

Display comments: newest first

superhuman
5 / 5 (3) Apr 20, 2009
Hackers in your phone, stealing your data, buy our software now!

Trust Digital probably developped those hacks (if they are even real) so they can scare people into buying their software.

This could have been an interesting article if it provided all the crucial details like which phones are vulnerable, how the manufacturers reacted and how to download a patch. As it is this is just an ad for this shitty company which want's to profit from this vulnerability and peoples fear, too bad physorg posts such crap.
earls
1 / 5 (2) Apr 20, 2009
Yet another Microsoft security success story.
Arn
not rated yet Apr 22, 2009
I agree this is just a marketing ploy. But what does Microsoft have to do with the issue? Earls, haven't had your MS-bashing fix for today yet?
earls
not rated yet Apr 26, 2009
"DUR DUR DUR WAT DUZ MACROSOFT HAF TWO DEW WIF DIS?!!"

EdP said it all.
knobface
not rated yet Aug 07, 2009
yeh thats funny as ...but i think this could happen guys ...u now wat u do ? u just dont buy the software and wait until it happens then .... then u start complianing
ubiquitous
not rated yet Aug 23, 2009
No...not my personal information! Is no contact list safe? ....Fear certainly has many shoving fuel into its furnace of oppression.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.