'SMS of Death' Could Affect All Phones
German researchers have proven that the Short Messaging Service protocol (SMS) can be used to deliver malicious code to nearly all cellular phones — including feature phones — and do things such as force them off the network or force them to shut down. The researchers were able to set up a micro cellular network, scan devices that passed through it to determine their behavior, and then attach those phones via SMS. The point of the research was to demonstrate that with the right equipment, practically all cell phones are susceptible to attack. The researchers were able to successfully attack phones made by Nokia, LG, Samsung, Motorola, Sony Ericsson, and Micromax. According to the researches, it will be up to the network operators to come up with a way to defend against this sort of attack.
Facebook Messenger Brings SMS Back to Android App
Facebook today said Facebook Messenger users will once again be able to send SMS messages — as long as they're running Android. Essentially, Android users can set Messenger as the default SMS app, which will route all SMS messages and conversations through Messenger rather than any other SMS apps that may be installed on the device.
Motorola to Let Others Make Mods for Z Droids
Motorola today showed off the Z Droid and Z Droid Force handsets, which are compatible with magnetic modules that attach to the back. The Z Droid and Z Droid Force will have access to a handful of Moto Mods at launch, but Motorola hopes other companies will make Mods, too.
More Carriers and Phone Makers Agree to Adopt Google's RCS-Based 'Android Messages' Service
Google today said more wireless network operators and handset manufacturers will use Android Messages, its RCS-based messaging service, as the default SMS/MMS tool on their phones. (Android Messages was previously known as Google Messenger.) Some of the features of RCS, which is a global standard, include group chat, high-resolution photo sharing, advanced calling features, and read receipts.
Researchers Say WiFi Vulnerability Impacts Nearly Everything
Researchers say they've found a serious gap in the WPA2 security protocol that can allow hackers to use k ey r einstallation a tta cks (KRACKs) to compromise most WiFi devices. The researchers say the method allows hackers to read encrypted information transiting via WiFi, including passwords, emails, photos, credit card numbers, and more.
--soon our phones will be compromised. Excellent.
soon? lmao. Soon was long ago.