Eh, tú,
Estar en el saber!

35,000 infecciones ransomware por mes y todavía se cree que están protegidos?

Regístrese para recibir:

  • alertas
  • Noticias
  • libre de la forma de quitar las guías

de las nuevas amenazas en línea - directamente a su bandeja de entrada:


Errores cruciales Android Estar actualizados por Google

android-malware stforumerrores muy importantes en el Android de todos los dispositivos Nexus fueron parcheados con una nueva actualización de seguridad por Google. Dos de ellos para ser específica. Malware researchers report that one bug could allow a hacker to start malware remotely on the infected device and the other one could hide malware in images which cause infection without the victim even having to open the files.

Vulnerability Number One

The exploit that was initially discovered by Mark Brand – researcher from the Google Project Zero (for zero-day exploits and others) is a very important one. De hecho, if the bug is used in an exploit kit, it can grant an attacker the privilege to spread the viruses in multiple techniques.

Según los informes, the researcher is curious as to why this bug has not been discovered so far. The exploit kit on which this bug is based has been detected only in several models of Nexus devices, and it is very difficult to apply it into real life usage. Además de esto, the exploit was also reported by the researcher that with additional research it could be reliable to hackers. Google has not yet received any reports of attacks using this exploit. Sin embargo, they strongly advise everyone to update their devices often.

The Second Vulnerability

The update released for the first Android vulnerability also patches another bug, according to reports by PCmag(http://www.pcmag.com/news/347781/google-patches-extremely-serious-android-bugs). The fixed bug was also very dangerous, primarily because it allowed for an exploit via a .jpeg file which is essentially an image. Such pictures could be sent to the user via mail or other services, and you do not even have to open the contaminated pictures to get infected with an exploit carrying malicious code.

What Does This Mean for Android Users

These specific exploits are reported to allegedly have something in connection with malware that can cause advertisements to appear automatically and make money to hackers by automatically opening third-party URLs. Such schemes are very common PPC (pay per click) fraud and they are part of a large network that generates revenue by connecting the infected device automatically to third-party websites. Essentially some of those viruses may also install other malware on your Android device, like mobile ransomware or even trojan that can root it. This is why it is good always to take appropriate actions to secure your phone, especially if you see those symptoms.

En general, sin embargo, bugs are found all the time, because as long as there are people who do the coding, there will always be flaws in the code itself. This is why one can never be too careful as to how smartphones are used.

Vencislav Krústev

Un administrador de red e investigador de malware de SensorsTechForum con pasión por el descubrimiento de nuevos cambios e innovaciones en seguridad cibernética. firme creyente en la educación básica de todos los usuarios respecto a la seguridad en línea.

Más Mensajes - Sitio web

Compartir en Facebook Compartir
Cargando ...
Compartir en Twitter Pío
Cargando ...
Compartir en Google Plus Compartir
Cargando ...
Compartir en Linkedin Compartir
Cargando ...
Compartir en Digg Compartir
Compartir en Reddit Compartir
Cargando ...
Compartir en Stumbleupon Compartir
Cargando ...
Por favor espera...

Suscríbete a nuestro boletín

¿Quieres recibir un aviso cuando se publique nuestro artículo? Introduzca su dirección de correo electrónico y nombre para ser el primero en saber.