Ei, tu,
Essere a conoscenza!

35,000 infezioni ransomware al mese e ancora crede che si sono protetti?

Iscriviti per ricevere:

  • avvisi
  • notizia
  • libera come da rimuovere guide

delle più recenti minacce online - direttamente alla tua casella di posta:


Bug Android cruciali Essere modificati da Google

Android-malware-stforumbug molto importanti nel Android di tutti i dispositivi Nexus sono stati rattoppati con un nuovo aggiornamento della protezione da parte di Google. Due di loro per essere precisi. Malware researchers report that one bug could allow a hacker to start malware remotely on the infected device and the other one could hide malware in images which cause infection without the victim even having to open the files.

Vulnerability Number One

The exploit that was initially discovered by Mark Brand – researcher from the Google Project Zero (for zero-day exploits and others) is a very important one. Infatti, if the bug is used in an exploit kit, it can grant an attacker the privilege to spread the viruses in multiple techniques.

Secondo i rapporti, the researcher is curious as to why this bug has not been discovered so far. The exploit kit on which this bug is based has been detected only in several models of Nexus devices, and it is very difficult to apply it into real life usage. In aggiunta a questo, the exploit was also reported by the researcher that with additional research it could be reliable to hackers. Google has not yet received any reports of attacks using this exploit. Tuttavia, they strongly advise everyone to update their devices often.

The Second Vulnerability

The update released for the first Android vulnerability also patches another bug, according to reports by PCmag(http://www.pcmag.com/news/347781/google-patches-extremely-serious-android-bugs). The fixed bug was also very dangerous, primarily because it allowed for an exploit via a .jpeg file which is essentially an image. Such pictures could be sent to the user via mail or other services, and you do not even have to open the contaminated pictures to get infected with an exploit carrying malicious code.

What Does This Mean for Android Users

These specific exploits are reported to allegedly have something in connection with malware that can cause advertisements to appear automatically and make money to hackers by automatically opening third-party URLs. Such schemes are very common PPC (pay per click) fraud and they are part of a large network that generates revenue by connecting the infected device automatically to third-party websites. Essentially some of those viruses may also install other malware on your Android device, like mobile ransomware or even trojan that can root it. This is why it is good always to take appropriate actions to secure your phone, especially if you see those symptoms.

Generalmente, tuttavia, bugs are found all the time, because as long as there are people who do the coding, there will always be flaws in the code itself. This is why one can never be too careful as to how smartphones are used.

Vencislav Krustev

Un amministratore di rete e ricercatore di malware presso SensorsTechForum con passione per la scoperta di nuovi cambiamenti e le innovazioni in materia di sicurezza informatica. Forte credente nella formazione di base di ogni utente verso la sicurezza on-line.

Altri messaggi - Sito web

Condividi su Facebook Quota
Loading ...
Condividi su Twitter Tweet
Loading ...
Condividi su Google Plus Quota
Loading ...
Condividi su Linkedin Quota
Loading ...
Condividi su Digg Quota
Condividi su Reddit Quota
Loading ...
Condividi su Stumbleupon Quota
Loading ...
Attendere prego...

Iscriviti alla nostra Newsletter

Vuoi essere avvisato quando il nostro articolo è pubblicato? Inserisci il tuo indirizzo e-mail e il nome sottostante per essere il primo a sapere.