Tesco Hudl Tablet: Naked Photos Can Be Recovered By Others

Author James Mash 15.8.2014. | 11:56

They say these days, parents fear what their son might be downloading as well as what their daughter might be uploading. A bug in the processor of the Hudl tablet, which is owned by British supermarket giant Tesco’s revealed that the one drunken naked shot you may have taken can be retrieved even after being deleted. An investigation found that it was possible to recover information from Android’s data deleting system as they tested seconds-hand devices bought on eBay. They found that an actual reset of the tablet just removed the list of where data was stored and deleted nothing else. Tesco’s Hudl is guilty of having a terrible flaw which enables attackers to get data that is saved on the internal memory.

The rockship processor that is the heart of the Tesco Hudl tablet has a known bug that allows for this information to be recovered. Most modern gadgets can be changed to flash mode where the firmware can be updated and data written to the device. The flaw is that the firmware allows you to not read from it but also to write from it as well. To test this, the investigators installed a freely available software tool that can simply read data from from Hudl tablets to which the factory reset facility had been applied. People believe that a factory rest removes all the files, cookies etc when actually it doesn’t and with this software they were able to extract Pin codes, as well as Wi-Fi keys, cookies and other browsing data that could be used to sign in to a website.

 

selfie2-nov21

 

Tesco has kept their mouth shut about this so far. However, Google who are the men and women behind Android claims that is you are going to sell or dispose of your device then you should enable encryption on the device and apply a factory reset beforehand.
It is not just Hudl tablets that were susceptible but also other Android devices too. A big investigation resulted in thousands of images being recovered and some of them images were some people wearing their “birthday suit” as well as some emails and text messages with sensitive material.

 

Also iOS users need to also beware as they are not completely immune as attackers can get their personal data too. Large sums of money have been stolen thanks to mobile phone theft as they use software to access sensitive material on the user’s phone. Some undisclosed features in the iOS operating system bypass the data encryption system running on the device. Apple has implemented new changes in iOS 8 since this has come forth.

Please click here to read more.

Author James Mash 15.8.2014. | 11:56
Write a comment

No Comments

No Comments Yet!

Let me tell You a sad story ! There are no comments yet, but You can be first one to comment this article.

Write a comment
View comments

Write a comment

Leave a Reply

Watch latest gadget videos

Chinavasion Video


action cam

Add Chinavasion on Google+

Add Chinavasion on Facebook

Archive