A new vulnerability has been found (and thankfully, contained) by Qihoo 360 developer Guang Gong who had been working on the exploit for three months before demonstrating it at the PacSec conference in Tokyo. The exploit worked by targeting the Chrome app's JavaScript engine and installed a BMX bike game. Without requiring interaction of the user, the vulnerability demonstration exemplified complete control of the device. All the user has to do is visit a site that contains the vulnerability and the JavaScript hack will take care of the rest. Google had a representative at this conference who was able to see the bug working in action. As reward for Gong's work, he will be flown all the way to Vancouver for the CanSecWest Applied Security Conference where he will go on a ski trip. Thankfully this vulnerability can be patched through a Chrome update through the Play Store, unlike Stagefright which required a software patch to the OS. Most people are careful about the kinds of sites they visit. Particularly sites offering copyrighted material for free can be riddled with malware and virus links. Source |...
Source: http://www.gsmarena.com/verizon_travelpass_lets_you_call_text_and_surf_overseas-news-15002.php