
“Google and its Android partners on Wednesday started distributing a fix for a vulnerability that could cause millions of phones to execute malicious code when they’re sent a malformed text message or the user is lured to a malicious website. The flaw in an Android code library known as Stagefright was disclosed last week, several months after security researchers privately reported it to engineers responsible for Google’s Android operating system. Google engineers, in turn, have introduced changes to the Android text messaging app Messenger. The changes mitigate the threat by requiring users to click on videos before playing them.”
Related posts:
Chicago Issues $100 Million in Bonds to Settle Police Brutality Cases
Author Behind Ransomware Tox Calls it Quits, Sells Platform
Piers Morgan: Now I see U.S. government tyranny
AIPAC comes out for strike on Syria, mentions Iran more often than Syria
Grandmother Struck and Killed by Drunk Driving NY Officer
Soon You'll Be Able to Hijack Weaponized Police Drones in Connecticut
SWAT Team Kills Armed Homeowner in Dawn Drug Raid
"Does the NSA Violate Your Constitutional Rights?"
The Next Domino: Slovenia Government Bond Yields Spike
Who voted for the Reed Amendment in 1995 and 1996?
Colorado Makes History with First Legal Retail Marijuana Sales
How Far Behind Detroit Are the Finance Troubles of Chicago, Los Angeles and Baltimore?
Bradley Manning and Freedom of the Press
WikiLeaks: Council on Foreign Relations Controls Most Mainstream Media
36-Year Old Hacker Who Made ATMs Spit Out Cash Dies in San Francisco; Hastings Connection?