TAG

#samsung hack

1 Articles

If you're using a Samsung smartphone with TouchWiz including the Galaxy S2 and some Galaxy S3 models, be aware that there's a web hack that can trigger a factory reset on your beloved smartphone. The web hack is actually a malicious code that is hiding inside a web page and gets triggered when visited using the stock browser (except Google Chrome) of a TouchWiz-based phone. Here's a more detailed example: The USSD code to factory reset a Samsung Galaxy S3 is: *code*code# and can be triggered from browser like: frame src="tel:*code*code%??" (Of course we're not allowed to replicate the real code here) The code can also be delivered via URL, NFC or QR codes. https://www.youtube.com/watch?v=Q2-0B04HPhs Samsung devices reported to be vulnerable are the Galaxy Beam, S Advance, Galaxy Ace, Galaxy S2 and Galaxy S3 with older firmware. However, Samsung phones running stock Android OS, like the Galaxy Nexus, are immune to this malicious code. So if you're using a Samsung TouchWiz phone, make sure that you update to the latest firmware and use Chrome as a preventive measure. On the other side of the news, Samsung was also reported to be developing its own web browser that uses WebKit - the same browser engine that Apple uses in Safari, Google's Chrome and on RIM's BlackBerry devices. Read more in our articles including "Web hack can factory reset Samsung phones" and "Google announces Googlebook as new AI-powered laptop category".

More About samsung hack

Frequently Asked Questions

What is samsung hack?

If you're using a Samsung smartphone with TouchWiz including the Galaxy S2 and some Galaxy S3 models, be aware that there's a web hack that can trigger a factory reset on your beloved smartphone. The web hack is actually a malicious code that is hiding inside a web page and gets triggered when visited using the stock browser (except Google Chrome) of a TouchWiz-based phone.

What have you covered about samsung hack?

Here's a more detailed example: The USSD code to factory reset a Samsung Galaxy S3 is: *code*code# and can be triggered from browser like: frame src="tel:*code*code%??" (Of course we're not allowed to replicate the real code here) The code can also be delivered via URL, NFC or QR codes. https://www.youtube.com/watch?v=Q2-0B04HPhs Samsung devices reported to be vulnerable are the Galaxy Beam, S Advance, Galaxy Ace, Galaxy S2 and Galaxy S3 with older firmware. However, Samsung phones running stock Android OS, like the Galaxy Nexus, are immune to this malicious code.

Where can I find articles about samsung hack?

Our coverage of samsung hack includes: "Web hack can factory reset Samsung phones"; "Google announces Googlebook as new AI-powered laptop category"; "Samsung Innov8 i8510 confirmed". Each article provides unique insights and information.