Palm phones running on an older version of webOS can get hacked via SMS

Palm phones running on an older version of webOS can get hacked via SMS
Now that webOS 1.4 had been readily available, there was a new security flaw that was recently uncovered which showed how an unsuspecting webOS owners still running an older build of the platform could get hacked via SMS. Simply by using text messaging, owners could potentially be at serious risk if they are still running webOS 1.3.5 for some apparent reason. Due to the fact that many of its applications are written with HTML, JavaScript, and other web standards, the text messaging client in webOS was acting a bit naughty by not executing input/output validation on messages being sent to it – which ultimately led to an HTML injection bug. Fortunately though webOS 1.4 corrects the problem, but for anyone who is still running the older build, just contemplate what you could be getting yourself into by not upgrading.

via UberGizmo


FEATURED VIDEO

4 Comments

1. Mr.Nice.Guy

Posts: 7; Member since: Apr 13, 2010

Glad they fixed it but... just the kind of press Palm doesn't need right now.

2. Jyakotu

Posts: 867; Member since: Dec 12, 2008

I don't see why people wouldn't update software. Maybe it's just tech junkies that like to stay updated with their latest phone OS software.

3. kenneth2009

Posts: 2; Member since: Dec 31, 2009

Well at least the phone automaticlly will update themselfs ifthe consumer does not manually update. So there should very few or no phones at all that have the old software version.

4. sinon

Posts: 3; Member since: Apr 08, 2010

Why is this news? "There's a terrible hack that could affect you!! But it's been fixed already, for nearly two months."

Latest Stories

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at https://www.parsintl.com/phonearena or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit https://www.parsintl.com/ for samples and additional information.