Auto-Reset Blocker for Android
The worst known exploit of this vulnerability will factory reset your phone without confirmation.
The vulnerability is NOT limited to Samsung phones. All Android phones running less than Android 4.1.1 are vulnerable until manufacturers/carriers release updates.
Phones known to have updates available include: Galaxy S3, Galaxy Nexus
Configure and verify it works for you:
1. Try this IMEI test: http://git.io/HtEU4Q
2. Check the box to make "Auto-Reset Blocker" the default action
3. Auto-Reset Blocker will block it and show you the malicious number
4. Dismiss the request
5. Open this safe telephone number test: http://git.io/3LZlrQ
6. Auto-Reset Blocker will show the safe number
7. Touch "Dial"
8. Your normal dialer will open with the safe number
If you have more than one dialer installed (besides this one), step 7 will first ask you which dialer to use.
If you check the box labelled "Auto-dial when safe", steps 5 and 6 are eliminated for your next safe number.
Once you make it through the above instructions, you are all set! If you are browsing the web on your phone and a website uses a malicious code, Auto-Reset Blocker will block it and warn you (just like the IMEI test). Tap the Dismiss button and go back to your browsing.
If you have a question or concern, please email me (android@gicode.net). I have no way to answer questions or otherwise communicate with you via reviews.
Thats what I get
Fukthemall
It's only problem is that we don't know when it blocks reset!
Great
Spot-on, spartan app, small and effective!
Great app for peace of mind
Please add HTC Amaze 4G to the list of vulnerability
Love the latest update!
It successfully intercepts tel: protocol, showing app, so one big security failure is fixed for now. Also "safe number" filtering works by matching non-digits in number. However whenever clicking on "Dial" in ARB, system asks to choose between "Dialer" and "ARB" with no default checkbox. As a suggestion, ARB could not show main screen at all, just add panel notification "Number #*06# blocked", not to interfere with browsing. Anyway, this is the first, the only one and must have. Samsung Galaxy S3 I9300
Thanks for the simple fix it seems to work well from what I've tested on my Galaxy S Advance.
Deserves 10 stars. Will save a lot of phones. To Mose, you can't open the app from the app draw. Follow the link in the Dev's description.
How can i open this fucken app after install it?!!!
Works perfectly
Works very well.
Thanks
Thanks, great protection
Sweet and simple
Does just what we need it to do. Cheers Rusty!
Thanks man just saw this exploit on giz and found this at the same time
Works as described.
It does what it says it does...
I'm not sure if this is a real problem or not. Until I can get hold of tech support I'm downloading and keeping it. If I find it to be unnecessary, I'll knock this to one star and state it. 4 stars-when doing ok test it just kept popping up the choice instead of showing the ok screen. Had to hit back button then needed to clear the screen about 4 times. Why didn't Samsung make this app is what I would truly love to know?! Any ideas? God bless!!!!!!!
I'm using a Droid X and I'm not certain that this app is working. I'm running MIUI and when I try to use those test links they won't load in the stock browser or in Dolphin. I'm not sure if there's any way to tell if this is working or not...
Just installed ARB. Why doesn't it show up on my downloaded apps list? Did the install tests, everything's ok, but have to go to google playstore to see it on app list. Just happy to have USSD security and have as default dialer. Thanks!!
I'm not sure if I do, in fact, need this application. So until I'm sure, I'm keeping it. @Joemurder666 I Definitely #FollowBack #Twitples! #GodBless
D/L 2 seconds and works immediately
Works great, no unwanted USSD codes will be executed :) Need more translation please!
No description how to use...
Works exactly as described on my vulnerable Samsung GT-i9000M (CyanogenMod 9, Android 4.0.4).
Quick & Working patch! Thanks
See above.
Thats what I get
Wont open.......deleting
Well designed UI, small and unintrusive. Thank you!
Website test indicated vulnerability. Installed app. No more vulnerability. Thank you!
This works as described on my ZTE Blade (osf) custom ROM. Well done to the Dev.
Works great, don't forget to set to default for opening numbers from web
The Huawei U8300 (running Cyanogen Mod 7, Gingerbread v2.3.5) is also vulnerable. The app works wonderfully, good work.
Thank you for this app. Makes a very scary exploit no problem.
by K####:
So awesome the wrinkles on my nuts disappeared!