HTC Security Flaw Found on Multiple Android Phones

February 2012
Channel Insider;02/02/2012, p1
The article reports on the security law found on some of HTC Corp.'s smartphones, including its Desire HD, Glacier and ThunderBolt. It mentions that the security flaw allows hackers of applications to view and access the WiFi security information of the smartphones. HTC states that the flaw can be resolved through an automatic software upgrade.


Related Articles

  • Keep your phone safe.  // Consumer Reports;Jun2013, Vol. 78 Issue 6, p18 

    The article offers tips for maintaining the security of one's smartphone. Topics include using a screen lock or password protection; how malicious software, (malware), downloaded inadvertently, can perform unwanted actions such as sending unauthorized text messages or accessing one's accounts;...

  • Safe and Sound. Welych, Maria // Syracuse New Times;9/4/2013, Issue 2187, p15 

    The article offers tips on how to prevent security-related problems on one's smartphones including using security applications, being cautious when downloading computer applications, and verifying software programs.

  • Security Concerns for iPhone. Risen, Tom // U.S. News Digital Weekly;9/13/2013, Vol. 5 Issue 37, p9 

    The article discusses the concerns of some privacy advocates in the U.S. about the security features of iPhone 5s smartphone from computer developer Apple. The smartphone features a Touch ID scanner that enables users to login without a password. Some activists are also worried that the...

  • Proposal and its Evaluation of a Shoulder-Surffng Attack Resistant Authentication Method: Secret Tap with Double Shift. Yoshihiro Kita; Fumio Sugai; MiRang Park; Naonobu Okazaki // International Journal of Cyber-Security & Digital Forensics;2013, Vol. 2 Issue 1, p48 

    Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile terminals store several types of important data, such as personal information. Therefore, it is necessary to lock and unlock terminals using a personal authentication method such as personal...

  • SECURITY WATCH. Wolfe, Daniel // American Banker;1/14/2009, Vol. 174 Issue 9, p5 

    The article offers news briefs related to online computer security. A faulty password policy at the Twitter Inc. company allowed a computer hacker to access U.S. President-elect Barack Obama. A technique called in-session phishing allows computer hackers to intrude upon Webs sessions and trick...

  • Mobile security: an update. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2012, p17 

    In this article, the author claims that new attack vectors and vulnerabilities are matching the progress in mobile device management (MDM) offerings. The author reveals that his concerns about simple man-in-middle attacks over Wifi have been partly resolved and lauds as well MDM products for its...

  • Keystroke dynamics on Android platform. Antal, Margit; Szabó, László Zsolt; László, Izabella // Interdisciplinarity in Engineering;2015, Vol. 19, p820 

    Currently people store more and more sensitive data on their mobile devices. Therefore it is highly important to strengthen the existing authentication mechanisms. The analysis of typing patterns, formally known as keystroke dynamics is useful to enhance the security of password-based...

  • Securing the Mobile Landscape. Britt, Phillip // Information Today;Apr2009, Vol. 26 Issue 4, p1 

    The article emphasizes the need to secure mobile communication systems, particularly laptops, from computer hackers. John Pescatore, vice president and analyst for Gartner Inc., claims that hackers will continue to spend most of their time and abilities to break into laptops rather than handheld...

  • DIY Nodes.  // Makeshift;Fall2012, Issue 4, p7 

    The article offers information regarding the FabFi node, an open-source wireless mesh networking system which have been developed by hackers of Jalalabad in Afghanistan and provides high-speed internet access across Afghanistan, Kenya, and the U.S.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics