Multimedia Messaging Service - actually handled by the same messenger client used for SMS texts.
I edited the original post a bit to make that more clear
Comment has been collapsed.
52 Comments - Last post 36 minutes ago by trentjaspar
11 Comments - Last post 40 minutes ago by Lugum
76 Comments - Last post 3 hours ago by sensualshakti
34 Comments - Last post 3 hours ago by JMM72
4 Comments - Last post 4 hours ago by despiesi96
1,962 Comments - Last post 5 hours ago by MeguminShiro
15 Comments - Last post 7 hours ago by dingbat
513 Comments - Last post 3 minutes ago by JustinDolmaBiber
28,517 Comments - Last post 7 minutes ago by ADR14N
81 Comments - Last post 20 minutes ago by cg
1,054 Comments - Last post 30 minutes ago by MayoSlice
464 Comments - Last post 44 minutes ago by th4
37 Comments - Last post 46 minutes ago by HustlaOG
261 Comments - Last post 51 minutes ago by HustlaOG
Turns out there's a security exploit that can be activated by opening a deliberately malformed MMS message, which kicks in the moment the MMS content is downloaded.
The fun part is that by default, Android phones are configured to download MMS content automatically, so just receiving an attack message is enough. In other words: if the hacker's got your number that would be enough to get malware on you phone.
Easy stopgap:
Open the settings of your messenging (SMS/MMS) client, disable automatic downloading of MMS content. That'll give you the chance to check the message and delete it before the content download happens.
More details: http://www.androidcentral.com/stagefright-exploit-what-you-need-know
Comment has been collapsed.