IsraTechnologies News
Android update from Seven other flaws in different software libraries are the most concerning, all allowing remote control execution, where hackers can send multimedia messages or emails to launch their attacks.
The cyber security team was credited with finding six bugs in the ‘mediaserver’ component of Android, which processes media files, making up one critical issue. As there are many services that rely on media servers, such as MMS messages and browser playback of videos and music, a hacker could send exploit code for the bugs via those services. Much like with the original Stagefright, anyone exploiting the vulnerabilities could access a users’ audio and video streams, possibly via a single, silent text.
The other critical bug was in the “libutils” library, another core part of the Android operating system and the same component exploited in the recently-disclosed . Again, libutils deals with MMS and browser playback of media, meaning an attacker successfully exploiting the flaw could access the audio and video.
Comments
boom beach hack
I’ll immediately snatch your rss feed as I can’t in finding your email subscription link or e-newsletter service.
Do you’ve any? Please let me recognize so that I may subscribe.
Thanks.
Gabby
0102x/2/13E0celente artÃculo. Se hace necesario replicar en el resto de América Latina y el Caribe la cultura de Buen Vivir. En estos tiempos convulsos, se nos vende la cultura de lo fácil e individualista: la cultura del «vivir bien», donde cada quien toma su lado despreocupándose por la suerte de su comunidad y las y los demás.