This is a quick fix for the TEL attacks described here [1].
The tool works through publishing a URI handler for TEL. Every time a TEL URI is activated an application selector will be shown. If you suddenly see the application selector that includes Phone and TelStop you know something just invoked a TEL URI. If you didn't click a TEL link or tried to dial a number it is likely to be an attack. To check out the URI just select TelStop.
This website uses affiliate links. This means that if you click on a link and make a purchase, we may receive a commission. This does not affect the price you pay for the product.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.