Our customers’ security is a top priority. We are aware of this potential vulnerability and are working with our device manufacturer partners to ensure our customers are protected.
As a work around we are recommending users to disable the auto-playing feature for MMS messages on their device for their Text Messaging Apps (includes built in text messaging app that came with the device, Google Hangouts or any 3rd party messaging app you may use). To do this:
- Go to App Settings
- Disable ‘Auto-retrieve’ for MMS messages in the Messaging app's settings.
*Settings may vary
Wasn't that patched in yesturday's OG2 OTA? I didn't see anything specific in the changelog about stagefright. All I can say is OG2 made ram management on my phone a lot better, also it runs cooler and the battery life seems to be better sa well.
"Again i haven't seen this go public at all so not many are aware of this and most likely isn't a big issue if it hasn't been made public or Rogers hasn't said much about it. "
Remember that you said that...
My question is, will Rogers be making this patch available to ALL of their customers? I have an older model smartphone, the original note SGH-i717, and am already passed over for firmware updates. Is this going to be more of the same?
Sprint and AT&T have already rolled out security updates, and Telus was on the ball and notifying their customers six days ago, roughly around the same time you posted your first two ludicrous statements:
I think this is Samsung's call. As of what I understood, they will partner up with carriers to push security updates without going through carrier verification process that takes SOOOO LONG!! I'm pretty sure they will update all devices since the S3, but if they don't it doesn't really matter because you just have to turn off MMS Auto-Retrieve and thats it, the big bad wolf "Stagefright" is neutralized just like that. I know it's a major flaw, but the fix is so simple and anybody can do it. Social media made such a big fuss over nothing really, thanks to Zimperium for finding the exploit and telling the right people before this got in the wrong hands. Reming me of the Heartbleed, the internet exploit that would be so devastating it would change how we surf, 24 hours later, most websites had the exploit patched and nothing bad really happened.
Now, Apple has a situation on their hand over official applications being injected with malicious code that could pretty much forward all communication including keylogs, sms, phone calls, bank information and much more to hackers that are just waiting for the right naive victime...now thats a problem because it's happening right now.
@RogersDarrell Perhaps a text notification should be sent out to all devices? It's come to light that the previous patches sent out do not completely fix the issue. This is a major security issue any many people, most likely including your customers, don't know about it. Is Rogers not commited to the security of their customers' devices? Would it be that much of a pain to let them all know?
Not all devices or Android versions are affected. Rogers would raise a lot of unwarranted concerns by blasting everybody. Just Google to find out if your device is vulnerable.
As of this morning the Note 4 got the update for the Stagefright and a couple of other little twicks and such.