Information security research company Check Point recently discovered four new vulnerabilities in Android phones with Qualcomm processors. Through these vulnerabilities, hackers can take full control of affected phones. These vulnerabilities are called "Quadrooter" and affect more than 900 million phones and tablets. Hackers can trick users into installing malicious applications without requesting any special permissions. After the application is installed, hackers can gain root permissions and then take full control of the affected Android device, including the data and hardware in it, such as the camera and microphone. Google's own-brand Nexus 5X, Nexus 6 and Nexus 6P, as well as Samsung Galaxy S7 and S7 Edge are all affected by this vulnerability . The recently released BlackBerry DTEK50, although called the "most secure Android smartphone", still cannot get rid of this vulnerability. A Google spokesperson confirmed that the patches to fix these vulnerabilities will not be fully released until September. As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity. |
<<: Redmi Pro vs Meizu E review
>>: Why are the old domestic appliances from 20 years ago so durable?
This article is based on the industry background ...
For friends who do bidding, many will encounter t...
Author: Luo Huiqian, Researcher, Institute of Phy...
The highest mass-energy conversion rate that huma...
The 2015 Mobile Developer Report surveyed more th...
The access to mobile Internet has made it impossi...
China Science and Technology News Network, Februa...
On May 8, Hunan TV announced that it would no lon...
Course Catalog ├──17-node strategic structure | ├...
Editor's note: If you open the search softwar...
How fast are the followers of Kuaishou’s 2D creat...
It cannot be denied that, on the basis of guarant...
Last night, Apple quietly released the cheap versi...
Bidders must analyze keyword reports every day. W...