Home GADGETS Android Smartphone In Danger, 400 Vulnerabilities Discovered

Android Smartphone In Danger, 400 Vulnerabilities Discovered

Check Point has found 400 weaknesses on Android cell phones equipped for jeopardizing clients’ information. Analysts at CheckPoint, a leading network safety master, have found more than 400 weaknesses influencing Android cell phones that truly jeopardize clients’ information and security. The news comes straightforwardly from the Israeli organization that has distributed an official statement given DEF CON 2020, quite possibly the main gathering committed to the universe of PC security, where the “DSP-Gate” report will be introduced in which this new one will be clarified the issue that plagues Android cell phones.

The issue concerns a specific kind of cell phone or the gadgets of a particular organization; however, most Android telephones are accessible. From Samsung cell phones to Xiaomi, Huawei and OnePlus (to name the most popular brands), everybody is presented to the 400 weaknesses found with a money order Point. The explanation is obvious: the DSP is a chip in all Qualcomm processors and, like this, in most Android cell phones. There is still no arrangement accessible for all clients for the occasion: Qualcomm has effectively pre-arranged the patches. Presently, it depends on individual producers to execute them on their gadgets. In this way, we should stand by one more several months.

What Is A DSP, And Why Is It Dangerous For Android Smartphones?

Probably few have heard of it until today, but DSP is a tiny device present inside Android smartphones. It is a digital signal processor. What is its task? That of efficiently executing sequences of systematic instructions in digital signal processing. This particular processor is found inside many devices: headphones, intelligent speakers, infotainment systems and various technological equipment. For example, the smartphone has the task of decoding MP3 files or lowering and raising the level of music.

Check Point researchers found that DSP is a new vector that hackers can use to propagate cyber attacks. There are 400 vulnerabilities discovered, but the Israeli company did not want to disclose too many technical aspects pending individual manufacturers’ release of corrective patches. To exploit this vulnerability to hackers, it might be enough to convince the user to install a simple app on the smartphone.

What Are The Risks That Users Run

The most significant risks for users relate to their data. Check Point emphasizes three main aspects that must be considered if a hacker exploits one of the vulnerabilities to infect a smartphone.

The smartphone spies on users. A hacker may remotely take control of the smartphone to start spying on user activity. But not only. It could also steal personal data such as photos, videos, call recordings.

The smartphone becomes inaccessible. As if you were infected with ransomware, the famous ransom virus that blocks access to your device and asks for a reward to unlock it, this new vulnerability can be used to make access to any information in the smartphone’s memory inaccessible.

The malware was impossible to remove. Hackers could install malware that hides their activity and is impossible to extract.

How To Solve The Problem

At the moment, users don’t have any tools to protect themselves from these vulnerabilities, but at the same time, hackers are unaware of the technicalities that make smartphones unsafe. Qualcomm has released patches CVE-2020-11201, CVE-2020-11202, CVE-2020-11202, CVE-2020-11206, CVE-2020-11207, CVE-2020-11208 and CVE-2020-11209, which will need to be used by individual manufacturers to implement them in future security updates.

Also Read: Android 11: These Are The Best New Features

Tech Buzz Reviews
Techbuzzreviews are a team full of web designers, freelancers, marketing experts, bloggers. We are on a mission to provide the best technology-related news with passion and tenacity. We mainly focus on the areas like the latest technology news, upcoming gadgets, business strategies and many more upcoming trends which are trending all over the world.

Most Popular

An Overview of APA Dissertation Format Requirements with Essential Writing Tips

An APA dissertation format communicates scientific communication by standardising research work. It promotes clarity of expression. APA style makes it easier for the reader...

Reducing Overhead Costs with LED Warehouse Lighting

In the vast expanse of a modern warehouse, lighting isn't just a matter of flipping a switch; it's an ongoing operational cost impacting everything...

The Power Of AI In Cybersecurity: 3 Questions CISOs Should Ask Themselves

To protect businesses against growing threats, it is essential to carefully review new technologies before deploying them. Even more precisely, the year of generative...

Why Make A Business Plan Before Becoming A Micro-Entrepreneur?

The business plan should be given more attention by micro-entrepreneurs. Only some of them take the time to prepare and build one before creating...

MEP Design for Net-Zero Energy Buildings: Principles and Applications

In an era where sustainability is the buzzword, there’s an increasing global movement towards greener and more energy-efficient solutions. This trend is not left...

OpenAI: What Can We Do With The API?

It's been a little over a year since the OpenAI API was opened without a waiting list. What does it give access to? What...

What Is A Difficult Customer?

In the business world, encountering a demanding customer is inevitable. Whether it's a customer unhappy with previous purchases, a demanding customer seeking perfection, an...