Home GADGETS Android Smartphone In Danger, 400 Vulnerabilities Discovered

Android Smartphone In Danger, 400 Vulnerabilities Discovered

Check Point has found 400 weaknesses on Android cell phones equipped for jeopardizing clients’ information. Analysts at CheckPoint, a leading network safety master, have found more than 400 weaknesses influencing Android cell phones that truly jeopardize clients’ information and security. The news comes straightforwardly from the Israeli organization that has distributed an official statement given DEF CON 2020, quite possibly the main gathering committed to the universe of PC security, where the “DSP-Gate” report will be introduced in which this new one will be clarified the issue that plagues Android cell phones.

The issue concerns a specific kind of cell phone or the gadgets of a particular organization; however, most Android telephones are accessible. From Samsung cell phones to Xiaomi, Huawei and OnePlus (to name the most popular brands), everybody is presented to the 400 weaknesses found with a money order Point. The explanation is obvious: the DSP is a chip in all Qualcomm processors and, like this, in most Android cell phones. There is still no arrangement accessible for all clients for the occasion: Qualcomm has effectively pre-arranged the patches. Presently, it depends on individual producers to execute them on their gadgets. In this way, we should stand by one more several months.

What Is A DSP, And Why Is It Dangerous For Android Smartphones?

Probably few have heard of it until today, but DSP is a tiny device present inside Android smartphones. It is a digital signal processor. What is its task? That of efficiently executing sequences of systematic instructions in digital signal processing. This particular processor is found inside many devices: headphones, intelligent speakers, infotainment systems and various technological equipment. For example, the smartphone has the task of decoding MP3 files or lowering and raising the level of music.

Check Point researchers found that DSP is a new vector that hackers can use to propagate cyber attacks. There are 400 vulnerabilities discovered, but the Israeli company did not want to disclose too many technical aspects pending individual manufacturers’ release of corrective patches. To exploit this vulnerability to hackers, it might be enough to convince the user to install a simple app on the smartphone.

What Are The Risks That Users Run

The most significant risks for users relate to their data. Check Point emphasizes three main aspects that must be considered if a hacker exploits one of the vulnerabilities to infect a smartphone.

The smartphone spies on users. A hacker may remotely take control of the smartphone to start spying on user activity. But not only. It could also steal personal data such as photos, videos, call recordings.

The smartphone becomes inaccessible. As if you were infected with ransomware, the famous ransom virus that blocks access to your device and asks for a reward to unlock it, this new vulnerability can be used to make access to any information in the smartphone’s memory inaccessible.

The malware was impossible to remove. Hackers could install malware that hides their activity and is impossible to extract.

How To Solve The Problem

At the moment, users don’t have any tools to protect themselves from these vulnerabilities, but at the same time, hackers are unaware of the technicalities that make smartphones unsafe. Qualcomm has released patches CVE-2020-11201, CVE-2020-11202, CVE-2020-11202, CVE-2020-11206, CVE-2020-11207, CVE-2020-11208 and CVE-2020-11209, which will need to be used by individual manufacturers to implement them in future security updates.

Also Read: Android 11: These Are The Best New Features

Tech Buzz Reviews
Techbuzzreviews are a team full of web designers, freelancers, marketing experts, bloggers. We are on a mission to provide the best technology-related news with passion and tenacity. We mainly focus on the areas like the latest technology news, upcoming gadgets, business strategies and many more upcoming trends which are trending all over the world.

Most Popular

7 Tips To Create Better Social Media Videos

Whether you want to create videos for YouTube, Instagram, Facebook, Twitter, TikTok, or any other social platform to engage with your customers, there are...

Video Conferencing Fatigue: 7 Tips For Online Meetings

In the age of hybrid work, video conferences and online meetings are a matter of course for many people in their everyday work. The...

FinOps: These Practices Are Gaining Momentum

The mass migration to the cloud is in full swing. There is hardly a company that does not yet rely on SaaS and operates...

Importance Of English Learning For A Sportsman

If you're a sportsman, you know that learning English is essential if you want to take your career in that specific game to the...

How To Choose The Right Domain Name

Choosing the right domain name is essential for any business. You want something that is easy for people to remember, that shows off your...

Artificial Intelligence And Human Genius: The State Of The Art

Art and technology: an oxymoron of our day? The AIs that have learned have to paint like the great masters. Artificial intelligence (AI) is...

How Financial Service Providers Succeed In Digital Transformation

The article describes the three pillars of a successful digital transformation of financial services companies: continuous learning, improved operations, and powerful customer experiences.The financial...