Connect with us

Hi, what are you looking for?

News

The attacker may have exploited a vulnerability in the Google search application

The attacker may have exploited a vulnerability in the Google search application

Cyber ​​attacks are the reason why software is becoming Modern to defend against such attacks. Unfortunately, as software improves, cyber attacks have become more sophisticated. Oversecured recently released a report that Google Android apps with more than 5 billion downloads are unlikely to be attacked by hackers who can access the personal information in the navigation history of Gmail victims.

The researcher who discovered this potential threat believes that when people use the latest version of this research conducted by Sergei Toshin, he himself will develop a security system for smartphones. In explaining how the operating system runs on Android devices, he said that if a hacker manages to set a code to trick the operating system into reading the modified code, the Android software can work with other applications (such as their code and files) to Start the application correctly.

Once these codes are read, hackers can access any files belonging to the user that can be used to attack them. Toshin not only talked about it but also showed his concept, showing how things really happened. Software with 3 vulnerable applications. He showed how to easily add new code to the Google Play core library. When the library was used by an Android application, it started as a malicious application to control the device and gain access to each file.

The serious part of this attack is that it will stay there even if the user uninstalls the application. Toshin explained that the attack was very quiet, and the hacker could use his mobile phone to make calls, send text messages, access contacts, and phone history. You can even turn on the camera without notifying the victim. These attacks are not just about it. Usage Many other applications (including TikTok) also have weaknesses that can be exploited by users.

Twitter has a headache after India occupied Kashmir, Ladakh is shown separately on the map

When they discovered this vulnerability, they reported it to the tech giant and were rewarded. As a security measure, Google resolved this issue and announced that users can now update their apps if they haven’t already. You say that Google appreciates your efforts. Run by Oversecured, and as the application is updated, they cannot hear any news related to cyber-attacks.

The attacker may have exploited a vulnerability in the Google search application

Image Credit: Digital Information World

OVERVIEW:

In explaining how the operating system runs on Android devices, he said that if a hacker manages to set a code to trick the operating system into reading the modified code, the Android software can work with other applications to Start the application correctly. When the library was used by an Android application, it started as a malicious application to control the device and gain access to each file. Run by Oversecured, and as the application is updated, they cannot hear any news related to cyber-attacks.

mail2box786@gmail.com'
Written By

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Mobile

iPhone SE3, The iPhone S, could not be released as a sequel 2020 this year. According to new reports, the iPhone SE 3 is...

Entertainment

WWE After the Bell with Corey Graves and Vic Joseph will play host to special guests and surprises in the lead-up to WrestleMania 37 with daily episodes beginning...

Tech

The China Telecom site shared key details of the Open A35 before its launch. It shared price information, images, and specifications. MediaTek Helio P35...

Showbiz

Pakistani actress Neelam Munirka said that I always try to keep my job while I do not interfere in anyone’s affairs. Pakistani celebrity Neelam...