50,000 - 100,000 downloadsAdd this app to your lists
+ By Anti Spy Mobile
Please follow the installation instructions below:
1. Check if your phone is vulnerable.Open your browser and navigate to: http://goo.gl/sRHFC (or scan the barcode at the header of the page).
2. If your phone is vulnerable you will see your IMEI number displayed. (*#06# is not an IMEI number!).
This means that service MMI commands can be executed on your phone, when you visit a malicious web page. The MMI commands are service commands, and if you see the IMEI it doesn't mean that your phone is vulnerable to the Samsungs data wipe vulnerability. Still everyone can execute MMI commands on your phone asking you to open a remote web page URL.
3. If DON'T see the IMEI number, you are safe and you don't need this app :)
4. If you see a popup with your IMEI number, then install this app from Google Play (click on install button on the the left).
5. Once you install the app navigate again to: http://goo.gl/sRHFC (or scan the barcode at the header of the page).
6. Your phone will ask you how to complete the action. Choose USSDFix and mark it as default for this action.
7. You will see a notification that your phone tries to open a page that contains a USSD call and will block it.
8. Your phone is safe now !
NOTE: The app uses a hidden launcher and will not appear in the list of the other apps on your phone desktop. If you want to remove the program, please navigate to Settings / Manage Applications and then remove "USSDfix" app.
Keywords: USSD, security, vulnerability, patch, Notel links, tel link, Android, dirty USSD code, DirtyUssdCode, ekoparty, galaxy, galaxy s III, GalaxySIii, mobilepostcross, Ravi Borgaonkar, RaviBorgaonkar, samsung, security conference, SecurityConference, touchwiz, USSD, USSD code, UssdCode
Tags: mmi code error, mmi error, ошибка mmi, error mmi, how to fix mmi code error, how to solve mmi code error, mmi code for idea, mmi complete error, ussd mmi fix, ussd fixes.