USSD Wipe Stopper - by Bitdefender. Once installed, your device is safe from running unauthorized USSD commands even if your Android version is vulnerable
The operating system your smartphone is running may be vulnerable to USSD commands that could wipe your entire phone.
Tapping on a link to a cleverly coded web page could order you phone to reset itself to factory settings and disintegrate all your private data with it.
Any Android phone running Phone.apk v 4.1 or lower is at risk and that's the broader base of them. Install Bitdefender's USSD Wipe Stopper to protect against such attacks. Now, once you would tap on a exploiting link, Bitdefender will intercept the wipe command and ask you to decide what to do next. You may, if unsure, dismiss the USSD command.
Find out more about this security vulnerability at http://www.hotforsecurity.com/blog/bitdefender-wipe-stopper-prevents-remote-ussd-attack-on-androids-3657.html
or in prestigious press outlets:
Tags: ussd, ussd code, ussd check, android ussd, url, security
Bitdefender USSD Wipe Stopper is a free software application from the System Maintenance subcategory, part of the System Utilities category.
The app is currently available in English and it was last updated on 2013-09-16. The program can be installed on Android.
Bitdefender USSD Wipe Stopper (version 1.3) has a file size of 100.35 KB and is available for download from our website.
Just click the green Download button above to start. Until now the program was downloaded 11 times.
We already checked that the download link to be safe, however for your own protection we recommend that you scan the downloaded software with your antivirus.
Here you can find the changelog of Bitdefender USSD Wipe Stopper since it was posted on our website on 2014-06-13.
The latest version is 1.3 and it was updated on soft112.com on 2018-03-22.
See below the changes in each version:
posted on 2013-09-16
- usability improvements. Added support for permanent protection (without affecting the user experience),- Fix for some false vulnerability reports on patched SGS3 devices,- Fix for a minor typo