PS5 details: Is there a risk that hackers will exploit them?
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More
Latest Posts

Android rooting bug puts millions of smartphones at risk!

Google issues an urgent correction and prohibits rooting applications from Google Play, but millions of Android smartphones are at risk from this rooting bug.


A bug discovered by 2014 has caused Google engineers sleepless nights as Google tries to eliminate rooting applications exploiting an unpatched Linux kernel bug affecting all Android devices. The bug puts millions of phones at risk, including the entire series of Nexus models, and allows hackers to run malicious code and take control of key operations almost permanently.

[button type = »link =» »size =» btn-large »variation =» btn-warning »] Released the first Weaponized Android Stagefright exploit [/ button]

The defect, which is mainly a vulnerability of the Linux kernel, allows applications to obtain almost unlimited root access that bypasses the entire Android security mechanism. The error discovered by 2014 can be exploited by a local attacker who can gain privileges in affected systems. The programmers Linux the vulnerability of 2014 was repaired, but smartphones that were also vulnerable to the same vulnerability were never repaired.

The bug appeared again in 2015, and the CVE-2015-1805 Vulnerability ID was given in February of 2015. Google has tried to tackle and prohibit root-based apps available on Google Play that can easily exploit vulnerability. According to a counseling on Friday, anonymous rooting applications can lead to a permanent compromise of the device.

Google was forced to release the emergency patch after researchers from the security firm Zimperium reported last week that the bug had affected a Nexus 5. Google then confirmed that a rooting application available to the public could also endanger Nexus 6.

[button type = »link» link = »» size = »btn-big» variation = »btn-success»] Android Trojan and Flash Player steal credentials [/ button]

The company also updated the security feature in Android Verify apps to crawl root applications. Google notes that it did not see rooting applications being used for exploitation that is considered malicious. To endanger a device, the user must install the rooting application manually.

Google also released a patch for other Android mobile manufacturers like LG, Samsung, HTC etc. and has also released repair for vulnerable kernels in the Open Source Android program.

[button type = »link» link = »» size = »btn-big» variation = »btn-danger»] Google-Microsoft- Yahoo unites their forces for safer email [/ button]
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *