Google's Stagefright Patch Doesn't Work

Android's code execution vulnerability, which allows hackers to remotely execute code on an Android phone simply by sending a text message to the device, allegedly patched by Google,  is still open.
Researchers from Exodus Intelligence report that they are still able to exploit the bug in the Stagefright tool even after the handset has been patched.
As if that wasn't bad news enough, another research firm has been able to break the isolation security that prevents one app accessing the information stored in another.
It seems very much like Google has lost control of the Android environment when it comes to security. Whilst there is no indication that exploits have been released that use either of these vulnerabilities, the potential impact of the two combined should have all Android users worried.
For all its flexibility and power, if Google cannot reassure its customers that Android's security lid is firmly in place, then they will inevitably seek out a platform where it is.


Popular posts from this blog

F1: Robert Kubica's Williams Test Asks More Questions Than It Answers

Antibiotic Resistance Threatens To Drag Healthcare Back To The Victorian Era

Monumentally Stupid Autopilot Buddy Is Banned To Stop Tesla Drivers Killing Themselves

Endeavour Wireless Ear Buds Review

iPad And Android Phone? Use Pushbullet To Get The Best Continuity Feature