Short cuts

Android Released Date features Activity Android Life Cycle Life Cycle of Activity ANDROID Version Micromax layout onCreate() onPause() onResume() onStart() Android 4.3 Android 4.3. Android One Android One smartphone Jelly Bean Life Cycle Moto X Nexus 7 Versions its Features latest Android 4.3 leak layout parameters onDestroy() onStop() 5G technology A new touchscreen display AT&T Android 4.4 KitKat release date Android. Apple Apple iPhone 5S Apple's iPhone 5 Battery CGL Canvas Nitro A310 smartphone HTC One Mini Huawei Technologies Layout Types Lenovo S5000 Mi3 Micromax Android One Moto 360 Moto G Moto G2 Online Payment Service SSC SSC CGL 2016 SSC CGL Apply online SSC CGL Notification SSC CGL important dates SSC CGL syllabus Samsung Samsung Tags:Galaxy Gear States T-Mobile Table Layout Tablets Verizon Visa Checkout Visa credit Wall Street Journal absolute layout airtel airtel entertainment android application development android gaming system android layouts android questions android rooting bundle debit cards developers facebook services finish() how to write android program iOS iPhone 5 identifying fingerprints indian developers installing interview questions on android for fresher iphone jailbreaking kitkat version libraries linear layout linux microsoft microsoft portal news note 8 pro nvidia online purchase operating system passport through smartphone redmi redmi note 8pro redmi note 8 redmi note 8 pro price redmi note8 pro specifiactions relative layout rooting run android application screen orientation smartwatch view

Sunday 14 July 2013

Technology News : Linux bug - Comes to Android

Android users have been warned that a recently-discovered Linux bug has been modified to work on Android smartphones and tablets.

Perhaps not the easiest threat to remember, CVE-2013-2094 is a vulnerability that allows criminals to escalate privileges to a point where they can, effectively, achieve complete control of a device.

The threat exists on the Android platform due to the fact that Android was developed using Linux, and so many Linux vulnerabilities could potentially be exploited on Android.

The Linux vulnerability originally affected systems running on the 2.6 version of the Linux Kernel. In Android, Jelly Bean (version 4.2) uses version 3.0 of the Linux Kernel, although previous versions were built upon 2.6. This doesn't explicitly mean that Jelly Bean devices aren't at risk, but it does mean that tablets or smartphones using older versions of Android are more likely to be.

Unfortunately, for devices using older versions, any threat has little chance of going away without an update to resolve the issue. That's a problem if a device is continually out of date, but even more so if hardware receives no support or OS updates after release.

In regards to the exploit itself, the Symantec Connect Blog explains the seriousness of privilege escalation software: "Privilege escalation exploits are particularly dangerous as they can allow cybercriminals to gain complete control over the compromised device. The Android operating system normally sandboxes every application so they cannot perform sensitive system operations or interfere with other installed applications".

Adding to that and highlighting potential issues users might face, the blog states, "In the past, we have seen malware use privilege escalation exploits to access data from other applications, prevent uninstall, hide themselves, and also bypass the Android permissions model to enable behaviours such as sending premium SMS messages without user authorization."

Android users should take steps to avoid allowing malware using the CVE-2013-2094 vulnerability – or any other exploit – to gain access to devices. To protect yourself and reduce the risk to your Android or smartphone or tablet you can do the following…

  • Ensure your Android smartphone or tablet has the latest version of Android installed (if available)
  • Restrict app installs to those from Google's Play Store
  • Protect your device with Norton Mobile Security, ensuring the latest update is loaded.

Together, these three precautions will ensure that you minimise the risk as much as possible, while having help on hand to remove any malware which seeks to give itself free reign. 

Read More: http://www.mobilesecurity.com/articles/551-linux-exploit-comes-to-android

No comments:

Post a Comment