This article is more than 1 year old
Windows Phones message hub hit by killer SMS
Text of doom
A security flaw has been discovered in Microsoft's Windows Phone OS which allows hackers to disable a handset's messaging system by SMS.
A malicious text can be sent which stops the SMS service from working, WinRumours reports. A factory reset is the only way to remedy the issue.
Although the SMS content is hidden from view, the hack can be seen in the video below, where it reboots the device and cuts access to the messaging hub. It can also be triggered by sending a Facebook chat or Windows Live Messenger message.
The hacker who spotted the bug is said to be working directly with Microsoft to resolve the problem.
Text message viruses have been infiltrating smartphones for some time. A couple of years ago, an SMS hack for iPhone was discovered, allowing those who used it access to a device remotely. ®
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- Application Delivery Controller
- Authentication
- Azure
- BEC
- Bing
- Bitlocker
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- HONOR
- Identity Theft
- Incident response
- Infosec
- Internet Explorer
- iPhone
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- Mobile Device Management
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Patch Tuesday
- Phishing
- Pluton
- PowerShell
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- Samsung Galaxy Ace
- SharePoint
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows 10
- Windows 11
- Windows 2000
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust
Broader topics
More about
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- Application Delivery Controller
- Authentication
- Azure
- BEC
- Bing
- Bitlocker
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- HONOR
- Identity Theft
- Incident response
- Infosec
- Internet Explorer
- iPhone
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- Mobile Device Management
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Patch Tuesday
- Phishing
- Pluton
- PowerShell
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- Samsung Galaxy Ace
- SharePoint
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows 10
- Windows 11
- Windows 2000
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust