Protecting Android smartphones from malicious code

October 07, 2012 09:44 am | Updated October 18, 2016 01:05 pm IST - Berlin

Samsung has released a firmware update that patches the vulnerability in its devices.

Samsung has released a firmware update that patches the vulnerability in its devices.

Owners of Android smartphones should check if their phone has security vulnerability. On some models using the Google operating system it is possible for USSD commands to execute without the consent of the user, for example via a malicious URL on a website.

The USSD codes could potentially be used by an attacker to lock the SIM card or cause call diversion. Security experts have warned that on certain Samsung devices USSD codes could even be used to delete all the data on the phone.

Anyone who wants to check the vulnerability of their smartphone can visit the website www.isk.kth.se/~rbbo/testussd.html using their phone’s browser. The test page checks whether the Android dialer processes USSD codes. If it does, the page will display the device’s IMEI number. If the IMEI appears it means the phone is potentially vulnerable to attack.

Samsung has released a firmware update that patches the vulnerability in its devices. Another way to close the security gap is to install the free app NoTelURL. The app warns users when an USSD command is encountered and asks whether they want to allow it to execute or not.

It’s also a good idea in any case to regularly back up your smartphone’s data.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.