MediaTek Bug Checker

MediaTek Bug Checker


SMS Hack Easily Force Reboots Some MediaTek-Based Smartphones
This application allow to check & test MediaTek Bug on your device (FREE)

A newly found and rather simple SMS-based hack is said to be affecting some smartphones running on MediaTek processors, rebooting the devices without the user's consent.

The SMS-based hack for the Mediatek-based handsets has been discovered by a blogger named Korben (via Neowin), and is said to restart the smartphones as soon as the handset receives a message containing the equal-to sign, or '='. The blogger notes that in MediaTek's chipset language, the symbol is code for 'shutdown and reboot device'.

It is worth noting that the handset will reboot even if the users don't open the text message or even when they are in between a phone call. The Neowin website has listed some of the Alcatel handsets that can be under the vulnerability area. Some of these handsets include One Touch Idol X, Idol Ultra, 997D, Pop C3, S-Pop, and Star. A list of Wiko handsets are also mentioned that are prone to this virus.

Users can avoid the SMS-hack completely by bypassing the native messaging app, and downloading a new default one from Google Play. For now, the complete list of affected MediaTek-based smartphones has not been released, and the hack could very well affect a significant portion of handsets in India, with its massive budget Android smartphone market that is filled with such inexpensive handsets.

Keywords: mtk, mediatek reboot,mediatek restart, mediatek sms reboot, mediatek exploit, mediatek security, fix mediatek, sms reboot, hack sms, tin nhan sap nguon
Add to list
Free
90
4.5
User ratings
44
Installs
1,000+
Concerns
0
File size
1204 kb
Screenshots
Screenshot of MediaTek Bug Checker Screenshot of MediaTek Bug Checker

About MediaTek Bug Checker
SMS Hack Easily Force Reboots Some MediaTek-Based Smartphones
This application allow to check & test MediaTek Bug on your device (FREE)

A newly found and rather simple SMS-based hack is said to be affecting some smartphones running on MediaTek processors, rebooting the devices without the user's consent.

The SMS-based hack for the Mediatek-based handsets has been discovered by a blogger named Korben (via Neowin), and is said to restart the smartphones as soon as the handset receives a message containing the equal-to sign, or '='. The blogger notes that in MediaTek's chipset language, the symbol is code for 'shutdown and reboot device'.

It is worth noting that the handset will reboot even if the users don't open the text message or even when they are in between a phone call. The Neowin website has listed some of the Alcatel handsets that can be under the vulnerability area. Some of these handsets include One Touch Idol X, Idol Ultra, 997D, Pop C3, S-Pop, and Star. A list of Wiko handsets are also mentioned that are prone to this virus.

Users can avoid the SMS-hack completely by bypassing the native messaging app, and downloading a new default one from Google Play. For now, the complete list of affected MediaTek-based smartphones has not been released, and the hack could very well affect a significant portion of handsets in India, with its massive budget Android smartphone market that is filled with such inexpensive handsets.

Keywords: mtk, mediatek reboot,mediatek restart, mediatek sms reboot, mediatek exploit, mediatek security, fix mediatek, sms reboot, hack sms, tin nhan sap nguon

Visit Website
User reviews of MediaTek Bug Checker
Write the first review for this app!
Android Market Comments
A Google User
Aug 19, 2014
Bas
A Google User
Jul 16, 2014
Hay ủng hộ hàng ViệtNam
A Google User
Jun 28, 2014
Good app
A Google User
Jun 28, 2014
Chuẩn Đúng cái mình cần. Chờ tải cho 5*
A Google User
Jun 27, 2014
Very helpful :)