|
|
Hackers can access using a simple image file on our Smartphone.
With a completely innocuous image file can take remotely control of the Android phone of a user. Given this file must be not even opened - the mere display of a thumbnail preview is enough already.
Each image file has not only image information in the luggage, but also additional information such as the camera model, geotagging information, shutter speed and more. These are the so-called EXIF information, use, for example, image management, to catalog the files. If malicious code stored in this information, this is accurately accessed at this moment, in which the image is somehow appear. This may already be the preview image that is automatically placed at the reception for display in Messenger.
Google has already recognized the seriousness of the problem and is today issuing a security patch that closes this gap. But this is unfortunately only a very small part of the solution, because the long delays in the distribution of updates on many different devices of countless producers, the risk still remain for a while.
@UMI:
When there is a new update that will eliminat this security risk?
This problem affects ALL UMI devices!
http://www.techworm.net/2016/09/ ... oid-smartphone.html
|
|