![]() In August 2015 (ie this month when this article was written), a company named, Zimpremium providing enterprise mobile security solutions & services, discovered a set of vulnerabilities in the stagefright library. But C++ is more prone to memory corruption & overflows. This was written in C++ native in order to improve media processing performance. Stagefright is actually a collective set of media formats bundled into a single library used for media playback in android OS. So first and foremost, now itself switch off the auto-download Media option in Messaging, Google Hangouts & other specific services you have installed in your android device. By doing so, the attacker can access your emails, facebook, whatsapp & many other services in your device. If the malicious MMS gets downloaded in your device the attacker gets access. An attacker can gain access to your device by sending you a malicious MMS. It can be through your carrier services or Google Hangouts or any other services which has auto download MMS enabled. Basically speaking, stagefright vulnerability is the flaw which allows an attacker to control your android device by sending you an MMS message. Stagefright is one of the latest large scale vulnerabilities that swept up to a billion android devices all over the world. ![]() Find out whether your device is vulnerable & Defend against Stagefright Vulnerability ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |