- Attack code exploiting Android’s critical Stagefright bugs is now public -- The python script generates an MP4 media file that exploits CVE-2015-1538 and gives the attacker a reverse command shell. The attacker is then able to take pictures and remotely listen to audio within earshot of the mic http://arstechnica.com/security/2015/09/attack-code-exploiting-androids-critical-stagefright-bugs-is-now-public/ 87 comments technology
Linking pages
- First-ever monthly Android security updates start to roll out | Ars Technica http://arstechnica.com/gadgets/2015/09/first-ever-monthly-android-security-updates-start-to-roll-out/ 5 comments
- University of Cambridge study finds 87% of Android devices are insecure | Ars Technica http://arstechnica.com/security/2015/10/university-of-cambridge-study-finds-87-of-android-devices-are-insecure/ 4 comments
- Google’s making a list: Android OEMs to be ranked, shamed by update speed | Ars Technica http://arstechnica.com/gadgets/2016/05/google-hopes-to-shame-slow-android-oems-with-update-rankings/ 1 comment
Linked pages
- 950 million Android phones can be hijacked by malicious text messages | Ars Technica http://arstechnica.com/security/2015/07/950-million-android-phones-can-be-hijacked-by-malicious-text-messages/ 277 comments
- The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes - Zimperium https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/ 13 comments
- Waiting for Android’s inevitable security Armageddon | Ars Technica http://arstechnica.com/gadgets/2015/08/waiting-for-androids-inevitable-security-armageddon/ 3 comments
Would you like to stay up to date with Python? Checkout Python
Weekly.
Related searches:
Search whole site: site:arstechnica.com
Search title: Attack code exploiting Android’s critical Stagefright bugs is now public | Ars Technica
See how to search.