Skip to main content

Unpatched Wi-Fi SoCs leave iPhones and Android phones vulnerable to hacker hijacking

A recently discovered vulnerability in a Wi-Fi chipset could be exploited to take over devices without users’ knowledge. A Google researcher publicly disclosed the bug in a blog post this week, which accompanied news from both Apple and Google that they’re patching devices in response. In his post and as detailed by Ars Technica, Gal Beniamini demonstrates how he exploited a Wi-Fi SoC manufactured by Broadcom to execute malicious code by solely being within the same Wi-Fi range of the targeted phone. No user interaction is required. This attack is slightly terrifying because the chipset hardware is baked into lots of phones, including the Nexus 5, 6, and 6P, as well as most Samsung flagship devices and all iPhones since the iPhone 4.
On the bright side: Broadcom is being responsive to Beniamini and is working with him to mitigate the issue going forward. Apple also already patched the bug with the release of iOS 10.3.1 on Monday, and Google patched it in its April security release.
The bad news, however, is that although Google has issued a fix, lots of Android devices fall behind regular patching schedules. More often than not, individual manufacturers or carriers have to push Android updates out over the air. This doesn’t happen as frequently as it should, which leaves device owners to hope no one targets their device in between the time it gets updated and when the bug is publicly disclosed. The only way to definitely receive all Android security updates is by sticking with Google’s phones, like the Pixel, or potentially unlocked Samsung devices, as the company says it’ll issue monthly updates in the future.

Comments

Popular posts from this blog

What is ARP Monitor?

ARP MONITOR It’s FREE  tool like arpwatch but for Windows OS. This tool can help with ARP activity monitoring in computer networks.   It allows you to catch intruders on the network, track MAC-IP bundles, detect scans, monitor real-time ARP protocol activity in the segment, and much more. This windows software monitors ethernet activity like unix apwatch and keeps a database of ethernet/ip address pairings. new activity - This ethernet/ip address pair has been used for the first time. new station - The ethernet address has not been seen before. flip flop - The ethernet address has changed from the most recently seen address to the second most recently seen address. changed ethernet address - The host switched to a new ethernet address.  Download :   Mirror: http://www.binaryplant.com/binaryplant-arp-monitor.exe