Connect with us

Hi, what are you looking for?

News

The attacker may have exploited a vulnerability in the Google search application

The attacker may have exploited a vulnerability in the Google search application

Cyber ​​attacks are the reason why software is becoming Modern to defend against such attacks. Unfortunately, as software improves, cyber attacks have become more sophisticated. Oversecured recently released a report that Google Android apps with more than 5 billion downloads are unlikely to be attacked by hackers who can access the personal information in the navigation history of Gmail victims.

The researcher who discovered this potential threat believes that when people use the latest version of this research conducted by Sergei Toshin, he himself will develop a security system for smartphones. In explaining how the operating system runs on Android devices, he said that if a hacker manages to set a code to trick the operating system into reading the modified code, the Android software can work with other applications (such as their code and files) to Start the application correctly.

Once these codes are read, hackers can access any files belonging to the user that can be used to attack them. Toshin not only talked about it but also showed his concept, showing how things really happened. Software with 3 vulnerable applications. He showed how to easily add new code to the Google Play core library. When the library was used by an Android application, it started as a malicious application to control the device and gain access to each file.

The serious part of this attack is that it will stay there even if the user uninstalls the application. Toshin explained that the attack was very quiet, and the hacker could use his mobile phone to make calls, send text messages, access contacts, and phone history. You can even turn on the camera without notifying the victim. These attacks are not just about it. Usage Many other applications (including TikTok) also have weaknesses that can be exploited by users.

Ransomware Victims Rarely Get Data Back After Paying

When they discovered this vulnerability, they reported it to the tech giant and were rewarded. As a security measure, Google resolved this issue and announced that users can now update their apps if they haven’t already. You say that Google appreciates your efforts. Run by Oversecured, and as the application is updated, they cannot hear any news related to cyber-attacks.

The attacker may have exploited a vulnerability in the Google search application

Image Credit: Digital Information World

OVERVIEW:

In explaining how the operating system runs on Android devices, he said that if a hacker manages to set a code to trick the operating system into reading the modified code, the Android software can work with other applications to Start the application correctly. When the library was used by an Android application, it started as a malicious application to control the device and gain access to each file. Run by Oversecured, and as the application is updated, they cannot hear any news related to cyber-attacks.

Advertisement. Scroll to continue reading.
Content Protection by DMCA.com
ameenasaeed99@gmail.com'
Written By

An experienced web content writer who loves to cover trendy and latest news. More than it she also in different blog writing and Amazon listing. Looking forward for better opportunities to fill the writing world with her own pen.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

News

Facebook and other social media platforms are on the verge of attacking Congress and have to defend their companies in lawsuits from time to...

Apps

Over the years, Twitter has faced various security issues related to its users. In order to highlight and consolidate its growing user base, Twitter...

Apps

YouTube has long been a popular video viewing platform with millions of users around the world, and the app does a great job of...

News

Technology and the Internet are developing rapidly, and new innovations and technologies appear every day. This technological advancement has undoubtedly changed our way of...