How to protect yourself from the Stagefright security flaw

BY

Published 29 Jul 2015

NSFW AI Why trust Greenbot

We maintain a strict editorial policy dedicated to factual accuracy, relevance, and impartiality. Our content is written and edited by top industry professionals with first-hand experience. The content undergoes thorough review by experienced editors to guarantee and adherence to the highest standards of reporting and publishing.

Disclosure

Stagefright is very likely the worst vulnerability to hit the Android ecosystem. l someone needs is your phone number in order to send a malicious MMS message that compromises your device. Even worse, the attacker can erase the message so you never know you’ve been hit.

The first thing you should do to protect yourself is turn off MMS auto-retrieval. The example below is from ’s Messenger app, which is one of the best apps for text messaging.

auto retrieve mms

ile this will impact your group messages, at least you’ll be safe from Stagefright.

Go to Advanced > Auto-retrieve flip it off. The only downside is you’ll get prompted to accept or reject MMS messages, which are those that include images, video, or group texts. It’s a worthy inconvenience to prevent your device from becoming a spy phone that monitors your every move.

Not every texting app will have the ability to enable or disable auto-retrieval of MMS messages, but many do, you’ll find the toggle in the app’s settings in a fashion similar to that above. If your texting app of choice doesn’t offer this feature, it might be time to switch to one that does.

Additionally, it’s worth connecting with your phone maker or carrier via Twitter. l the major carriers have a customer support Twitter account that you can use to pester about when a patch is coming for Stagefright. Reach out directly to T-Mobile, AT&T, Verizon, or Sprint. The squeaky wheel gets the grease!

y this matters: This flaw strikes at the heart of Android’s fragmentation. has already fixed the bug, but it’s up to phone manufacturers to apply it to their devices. Then the carriers must grant the update over their networks (except for unlocked devices, like some from Motorola). So far only Cyanogen devices Circle’s Blackphone have applied the patch. says a fix will go out to Nexus devices soon.