Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

how easily can a modern phone be infected?


  • Please log in to reply

#1
gomyr

gomyr

    Member

  • Member
  • PipPipPip
  • 240 posts
I just bought a Samsung Fascinate 3G phone with the android 2.2 OS on the Verizon network. Aside from downloading infected apps, opening an infected email or some other action initiated by the user, is it possible for someone OTHER than the user to cause a phone to be infected by direct means? The scenario I am considering is someone sitting in a cafe or other busy location and somehow using their own phone or computer to seek out other devices nearby and either infect them or infiltrate them for the purpose of gaining people's personal and confidential information. Does anyone know if this is currently possible/feasible, if so is it being done, and is there any known way to protect against it?

I routinely keep my phone's bluetooth, wifi, and 2 out of the 3 default location identification applications off for this very reason.

Is this being prudent or parnoid?

Thanks in advance for your replies.

Gomyr
  • 0

Advertisements


#2
Arranf

Arranf

    New Member

  • Member
  • Pip
  • 5 posts
No you're not being paranoid. just as vulnerable on your phone. While this sort of exploit is mostly theoretical there have been genuine security flaws that could, and have, posed a security risk such as the .pdf exploit on the iOS.

It's worth noting that the majority (if not all?) of 'android exploits', relating to the OS itself, are only proof-of-concept and that malicious apps and browser exploits should be your only real concern.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP