Submitted via IRC for AndyTheAbsurd
Google patched last month an Android bug that can let hackers spread malware to a nearby phone via a little-known Android OS feature called NFC beaming.
NFC beaming works via an internal Android OS service known as Android Beam. This service allows an Android device to send data such as images, files, videos, or even apps, to another nearby device using NFC (Near-Field Communication) radio waves, as an alternative to WiFi or Bluetooth.
Typically, apps (APK files) sent via NFC beaming are stored on disk and a notification is shown on screen. The notification asks the device owner if he wants to allow the NFC service to install an app from an unknown source.
But, in January this year, a security researcher named Y. Shafranovich discovered that apps sent via NFC beaming on Android 8 (Oreo) or later versions would not show this prompt. Instead, the notification would allow the user to install the app with one tap, without any security warning.
Source: https://www.zdnet.com/article/android-bug-lets-hackers-plant-malware-via-nfc-beaming/
(Score: 0) by Anonymous Coward on Tuesday November 05 2019, @07:48AM
Try beaming your seed of evil through my disabled NFC, mofos!
(Score: 0) by Anonymous Coward on Tuesday November 05 2019, @11:40AM (1 child)
The O.S is stolen and compromised by (((google))) with back-doors added for their convenience. They are making things easier and easier for themselves.
(Score: 0) by Anonymous Coward on Tuesday November 05 2019, @01:52PM
I was just thinking " Three letter agency/government planted back door".
There is no other conceivable reason for its inclusion.
(Score: 0) by Anonymous Coward on Tuesday November 05 2019, @07:28PM
NFC stands for Near Field Communication, and as the name implies it provides a wireless communication mechanism between two compatible devices.
NFC is a short range wireless technology having a range of 4cm or less for two devices to share data.
The transmission frequency for data across NFC is 13.56 megahertz, and data can be sent at either 106, 212 or 424 kilobits per second,
which is quick enough for a range of data transfers from contact details to swapping pictures, songs and videos.
Same freq as RFID tags.
(Score: 2) by FatPhil on Tuesday November 05 2019, @11:56PM
Why, then, did they program the connection server to accept applications for installation?
Google, to back up your assersion, show us the history of the specification document, the source code, and perhaps the test spec. To be explicit, I'm saying I don't believe you.
Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves