A security hole found in HTC's Android phones could allow access to Internet applications to access information such as text messages, e-mail addresses and user location. The ruling would affect most of the terminals of the manufacturer, including the popular HTC Thunderbolt and EVO 4G.
The ruling would affect the majority of handsets, including the HTC Thunderbolt and EVO 4G
HTC phones affected have installed a software package called HTCLoggers.apk. Applications with permission to connect to the Internet have access to that package, which in turn gives them access to information from the GPS, Wi-Fi network, the SMS, the phone memory and other data that can extract email addresses and phone numbers.
Experts have identified this vulnerability ensures that repair is not possible without an update or a patch developed by HTC. Even so, users of mobile phones Thunderbolt, 3D EVO, EVO 4G, 4G EVO Shift can choose to delete the package HTCLoggers of their devices.
The ruling would not directly related to Android as Google's operating system by default does not allow access to such information without prior consent.
At the moment there has been no use of this security hole by hackers.
The ruling would affect the majority of handsets, including the HTC Thunderbolt and EVO 4G
HTC phones affected have installed a software package called HTCLoggers.apk. Applications with permission to connect to the Internet have access to that package, which in turn gives them access to information from the GPS, Wi-Fi network, the SMS, the phone memory and other data that can extract email addresses and phone numbers.
Experts have identified this vulnerability ensures that repair is not possible without an update or a patch developed by HTC. Even so, users of mobile phones Thunderbolt, 3D EVO, EVO 4G, 4G EVO Shift can choose to delete the package HTCLoggers of their devices.
The ruling would not directly related to Android as Google's operating system by default does not allow access to such information without prior consent.
At the moment there has been no use of this security hole by hackers.
No hay comentarios:
Publicar un comentario