Google reveals that a simple photo could corrupt Android smartphones



[ad_1]

A photo in .PNG format was enough to compromise the security of an Android device. This is confirmed by Google itself in the security update of the operating system.

According to the developer's note, such a .PNG file was able to run codes on your smartphone without anyone knowing it. "The most serious of these issues is a critical security vulnerability in the structure that could allow a person to remotely use a specially mounted PNG file to execute arbitrary code in privileged process execution contexts." The severity badessment is based on the effect that exploiting this vulnerability could cause on an affected device. "

The ZDNet site has attempted to contact Google to specify the type of file and vulnerability that allowed this, but the company refused to disclose details for security reasons in order to avoid the risk of attacks on devices that may not be up to date yet. In addition, the site indicates that no user has published reports that may have been contaminated because of a .PNG file, even because, as pointed out Google, a hacker could act in silence without the user noticing

Join our CANALTECH GROUP of Whatsapp and Facebook and always guarantee the lowest prices on your purchases of technological products.

As a result, the company released a new fix in February 2019. This shows just how important it is that your device always be updated with the latest version of the system. To download this update (or check if your device is already up to date), you need to access the device settings. Then, just touch the update software :

Photo: Wagner Wakka / Cbadtech

Then click on the manually downloaded updates:

Caption

Your device will then look for a update from the system and the security patch. If there are any, download and install it to protect your device.

Source: Android

Enter your email on Cbadtech to receive daily updates with the latest technology news. (If that does not work, it will not work.) If it does not work, spider | crawl | slurp | bot / i)) {return false;} else if (navigator.userAgent.match (/ windows | linux | os s + x s * [d._] + | solaris | bsd / i)) {return false;}
return window.screenX === 0 && (& # 39; ontouchstart & # 39; in window || onmsgesturechange & # 39; in window);}; _ eCT = window._eCT || []; _ uCT = window._uCT || []; __ e4afd00cb0e5333242fec21b2421. (function, i, s, o, g, r, a, m); enableAutoplay = false; history.scrollRestoration = & # 39; manual & # 39 ;; if (window.location.hash! == # noads # 19459034} = r; .q || []) push (arguments)}, i [r] .l = 1 * new Date (); a = s.createElement (o), m = s.getElementsByTagName (o) [0]; a.async = 1; a.src = g; m.parentNode .insertBefore (a, m)} (window, document, "script", // www.google-badytics.com/badytics.js',' ga ", ((create, #AU-33160475-1, auto), ga (send, & # 39;) & # 39; pageview & # 39;); (function {) {var _fbq = window._fbq || (window._fbq = []); if (! _ Fbq.loaded) fbds.async = true; fbds.src = "http: //connect.facebook.net/en_US/fbds.js "; var s = document.getElementsByTagName ('script'); var fbds = document.createElement ('script') [0]; s.parentNode.insertBefore (fbds, s); _ fbq.loaded = true}; _ fbq.pu sh [‘addPixelId’,’301402963401732′])}) (); window._fbq = window._fbq || []; window._fbq.push ([‘track’,’PixelInitialized’,{}]); [ad_2]
Source link