Your Web News in One Place

Help Webnuz

Referal links:

Sign up for GreenGeeks web hosting
September 26, 2012 09:36 am EDT

Samsung has already patched 'dirty USSD' vulnerability for Galaxy S III

'Dirty USSD' code embed can reset your Samsung Galaxy S III  and other TouchWiz devices

If you were worried about stumbling onto a malicious website and accidentally wiping your Samsung Galaxy S III or other TouchWiz smartphone or slate, you can probably breathe easy. It's likely you already have firmware on your device which isn't vulnerable to the so-called dirty USSD code, and if not, you can download it now, according to Samsung. The company issued the following statement on the matter: "We would like to assure our customers that the recent security issue concerning the Galaxy S III has already been resolved through a software update. We recommend all Galaxy S III customers download the latest software update, which can be done quickly and easily via the Over-The-Air (OTA) service." It turns out we couldn't reproduce the bug earlier as we already had the latest update, and you should probably check to see that you do, as well. Meanwhile, we're also checking to see if other Touchwiz devices have been patched, so don't forget to watch what you click.

Filed under: , , ,

Samsung has already patched 'dirty USSD' vulnerability for Galaxy S III originally appeared on Engadget on Wed, 26 Sep 2012 05:36:00 EDT. Please see our terms for use of feeds.

Permalink | ||Comments

Original Link: http://www.engadget.com/2012/09/26/samsung-patched-dirty-USSD-vulnerability/

Share this article:    Share on Facebook
View Full Article

Engadget

Engadget is a web magazine with obsessive daily coverage of everything new in gadgets and consumer electronics. Engadget was launched in March of 2004 in partnership with the Weblogs, Inc. Network (WI

More About this Source Visit Engadget