Critical flaw found in Android

The company Bluebox Security that specializes in software security has found a critical flaw that affects nearly 99 per cent of all devices running Android. The flaw deals with security and if exploited can open the gate to hackers who can modify applications turning them into malicious software.

The problem runs deep going as early as Android 1.6 Donut and allows hackers to commit a range of actions that can harm the victim in numerous ways – from data theft to turning it into a mobile botnet. The most extreme harm could go as far as getting complete control over all device resources and data. If they wish to do so the hackers can even block the device.

The bug has been found as early as February so a fix is on the way and should come anytime soon. The problem is that manufacturers should release the update and as we know this takes time sometimes.

Source: IXBT

Related posts

NVIDIA releases the GeForce GTX Titan X

NVIDIA releases the GeForce GTX Titan X

NVIDIA has finally launched the rumored and highly expected GeForce GTX Titan X graphics card. Here are the tech specs – the card offers a GM200 Maxwell GPU on 28 nm technology, 3072 CUDA cores, 192 TMUs, 96 ROPs and a 384-bit memory bus, which serves 12 GB of GDDR5 memory. Despite the increase...

Toshiba announced 24nm process embedded-NAND flash memory

Toshiba Corporation today announced its next-generation 24-nanometer (nm) generation "SmartNAND" memory chips which have integrated control chip supporting error correction code (ECC), allowing enhanced speed performance of 1.9 times faster read speed and 1.5 times faster write speed than...

You can now download Windows 10 Technical Preview

You can now download Windows 10 Technical Preview

The biggest software event of the week is definitely the presentation of Windows 10 – the new OS brings along a number of new features and improvements including a new Start Menu, virtual desktops, full platform compatibility, the Continuum idea and much more. Unfortunately the retail version of...

Leave a comment