[![](http://feedads.g.doubleclick.net/~at/xv7wdwyBRX7yFkZZSr4Dn563PXU/0/di)](http://feedads.g.doubleclick.net/~at/xv7wdwyBRX7yFkZZSr4Dn563PXU/0/da)
[![](http://feedads.g.doubleclick.net/~at/xv7wdwyBRX7yFkZZSr4Dn563PXU/1/di)](http://feedads.g.doubleclick.net/~at/xv7wdwyBRX7yFkZZSr4Dn563PXU/1/da)
An anonymous reader writes with an item from The Next Web: "Security researchers participating in the Mobile Pwn2Own contest at the EuSecWest Conference in Amsterdam [Wednesday] demonstrated how to hack Android through a Near Field Communication (NFC) vulnerability. The 0day exploit was developed by four MWR Labs employees (two in South Africa and two in the UK) for a Samsung Galaxy S 3 phone running Android 4.0.4 (Ice Cream Sandwich). Two separate security holes were leveraged to completely take over the device, and download all the data from it."
[![](http://a.fsdn.com/sd/twitter_icon_large.png)](http://twitter.com/home?status=Android+Hacked+Via+NFC+On+the+Samsung+Galaxy+S+3%3A+http%3A%2F%2Fbit.ly%2FSEw996) [![](http://a.fsdn.com/sd/facebook_icon_large.png)](http://www.facebook.com/sharer.php?u=http%3A%2F%2Fmobile.slashdot.org%2Fstory%2F12%2F09%2F20%2F1324228%2Fandroid-hacked-via-nfc-on-the-samsung-galaxy-s-3%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook) [![Share on Google+](http://www.gstatic.com/images/icons/gplus-16.png)](http://plus.google.com/share?url=http://mobile.slashdot.org/story/12/09/20/1324228/android-hacked-via-nfc-on-the-samsung-galaxy-s-3?utm_source=slashdot&utm_medium=googleplus)
[Read more of this story](http://mobile.slashdot.org/story/12/09/20/1324228/android-hacked-via-nfc-on-the-samsung-galaxy-s-3?utm_source=rss1.0moreanon&utm_medium=feed) at Slashdot.
![](http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/ZEgBeoGKrTk)
URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/ZEgBeoGKrTk/android-hacked-via-nfc-on-the-samsung-galaxy-s-3
No comments:
Post a Comment