This is a quick fix for the TEL attacks described here [2]. TelStop publishes a TEL handler and will be invoked on every phone call the originates from a TEL URL. TelStop will only show itself if it sees a problem with the URL. You will only see the WARNING screen if the URL looks fishy.After installing try the TelStop Test Page [1][1] http://www.mulliner.org/security/telstop/test.html[2] http://www.engadget.com/2012/09/25/dirty-ussd-code-samsung-hack-wipe/Recent changes:Now supports HTC devices in transparent mode.Other devices (Moto, Samsung, ...) will follow.Please report problems.Fully transparent mode, will only bug you if it detects a malicious TEL URL.Content rating: Everyone
File Size11.66 kB
Operating System Android Android 2.3.3 - Android 2.3.7 Android 2.2
System RequirementsCompatible with 2.2 and above.