New Post has been published on Ragzon

http://ragzon.com/researchers-can-take-complete-control-of-android-phones/
http://ragzon.com/researchers-can-take-complete-control-of-android-phones/
http://ragzon.com/researchers-can-take-complete-control-of-android-phones/

Security firm Check Point has found a vulnerability in Android which allows the adoption of Android devices from popular manufacturers.
The researchers have given the name Certify leak-gate, and presented at hacker conference Black Hat .
The vulnerabilities in Android occur on devices from manufacturers Samsung, LG, ZTE and HTC. The way manufacturers known as remote support functions are applied, making possible abuse.
Remote support normally makes it possible for these companies to provide technical support on devices over the internet. But by abusing the security certificates from manufacturers, third parties in accordance with Check Point can thus gain access to Android devices.
No solution
Such access could be malicious see everything users do on their Android device, and also take full control. According to the researchers, there is no solution for users to withdraw the certificates that grant them access rights.
Check Point, Samsung, LG, ZTE and HTC made aware of the vulnerability. Who would then began to spread updates to fix the problems. Both Check Point and Google indicate that Nexus devices are not affected by the vulnerability.
Control app
Avi Bashan, head of mobile threat detection at Check Point, told Engadget that the fault lies with the manufacturers of Android devices. They would not have been properly implemented their versions of the support options.
Google says the researchers are grateful for finding and reporting the vulnerability. “The problem they describe refers to changes that make manufacturers and they make updates available to resolve the problems,” said the Android-maker.
Check Point has a free app developed to Android users can verify that the vulnerability occurs on their device.
Other major hack
Certify gate follows more than a week after the announcement of Android vulnerability Stage Fright. This leak comes in almost every version of Android before, and also makes acquisition of the entire device.
When the leak uses a vulnerability in the video of Android. Attackers can hide code in a video file, that thanks to applications like Whatsapp or MMS but also Hangouts is automatically saved. The code is then run undetected.
Samsung has already adapted its security policy in response to the leak. The popular Android manufacturer promises are appliances now provide new monthly security updates.
Android Logo, Android Wallpaper, LG Logo, Samsung Logo #AndroidLogo, #AndroidWallpaper, #LGLogo, #SamsungLogo