This is a quick fix for the TEL attacks described here [2].
TelStop publishes a TEL handler and will be invoked on every phone call the originates from a TEL URL. TelStop will only show itself if it sees a problem with the URL. You will only see the WARNING screen if the URL looks fishy.
After installing try the TelStop Test Page [1]
[1] http://www.mulliner.org/security/telstop/test.html
[2] http://www.engadget.com/2012/09/25/dirty-ussd-code-samsung-hack-wipe/
VERSION HISTORY
- Version 1.9 posted on 2012-09-29
Several fixes and updates - Version 1.9 posted on 2012-09-29
Now supports HTC devices in transparent mode.,Other devices (Moto, Samsung, ...) will follow.,Please report problems.,Fully transparent mode, will only bug you if it detects a malicious TEL URL.
Program Details
- Category: Communications > Telephony
- Publisher: Collin Mulliner
- License: Free
- Price: N/A
- Version: 1.9
- Platform: android