“A bug in the way Samsung’s TouchWiz UI interacts with USSD codes on Android smartphones may allow an attacker to perform a factory reset on susceptible devices, simply by embedding a link on a website or sending an SMS,” Matt Brian reports for TNW.
“An attacker could load the code in a website, SMS, an NFC Android Beam connection or via a QR code, have the user either visit the link or click it on their smartphone and it is possible to completely wipe the device without warning or giving the user the chance to stop it,” Brian reports.
Brian reports, “So far the following devices have been reportedly been confirmed to be affected: Galaxy S Advance; Galaxy S II (video); Galaxy S III; Galaxy Ace; Galaxy Beam.”
Read more in the full article here.
MacDailyNews Take: “Open.”
[Thanks to MacDailyNews Reader “David G.” for the heads up.]