Samsung is advising users of the Galaxy S III to update their smartphones in order to patch a vulnerability that could allow the devices to be remotely wiped by an attacker.
"The patch addresses a flaw presented at the ekoparty Security Conference in Argentina late last week that showed how easy it was to remotely reset an S III phone and apparently kill the phone’s SIM card," writes Threatpost's Christopher Brook. "Ravi Borgaonkar, a researcher in the Security in Telecommunications department at the Technical University Berlin, demonstrated an attack that exploited Unstructured Supplementary Service Data (USSD)."
"Samsung’s Belgian Twitter account announced the fix, and indicated that it should already be available," writes Geek.com's Sam Cook. "Owners of the Galaxy S III should check under Settings>About Device>Software Update to download the OTA patch. Samsung indicated that a similar update for the Galaxy S II is currently undergoing testing, and hopefully that means they’re planning to address all the other affected devices."
"A spokeswoman for the South Korean handset maker told me on Wednesday that the issue is now a non-issue as it has already been patched, but did not say when it was fixed, or which software version is the secure one," writes ZDNet's Ben Woods. "'We would like to assure our customers that the recent security issue concerning the Galaxy SIII
has already been resolved through a software update,' the spokeswoman told ZDNet. 'We recommend all Galaxy SIII customers to download the latest software update, which can be done quickly and easily via the over-the-air (OTA) service.'"
"However, the update is still being pushed out, so many users are reporting that [their] Galaxy S III still says there’s no update available," writes PCWorld's David Jeffers. "Also, there’s no acknowledgement or confirmation yet regarding the impact on other Samsung TouchWiz UI devices, or when or if an update can be expected for them."
Were you able to download an update for your device? Let us know in the comments below.