A security researcher demonstrated at a security conference last week in Argentina the weaknesses built into Samsung's Unstructured Supplementary Service Data (USSD), which allows message communication to go from the phone to the application server. Samsung's TouchWiz communicates with USSD and appears to be affected, he said. The demonstration showed how a hacker could take advantage of the vulnerability and attack a user who accesses on a bad link. Hackers can then remotely wipe the handset and SIM card in just a few minutes, and re-set the device to factory mode. This happens because of malicious code embedded within a website.
Visit our site to learn about computer forensics or Information Security. We are also experts in forensic analysis of mobile devices.