New Android Bug Can Let Hackers Attack Phone With PNG Image File

New Android Bug Can Let Hackers Attack Phone With PNG Image File

New Android Bug Can Let Hackers Attack Phone With PNG Image File

Google engineers have not revealed any technical aspect of the vulnerabilities so far, the updates mention fixing 'heap buffer overflow flaw', "errors in SkPngCodec". When an Android user opens such an image, the malware triggers the exploit and then allows attacker to remotely execute arbitrary code and thus take control of your device. Well, Google has uncovered a brand new security vulnerability that can be employed to hack Android smartphones using a PNG file.

Kanye West signature forged in $900k scam
He says the Plein and himself agreed on a "t-shirt" shortly after recanting on their "concert" agreement. They were also allowed a travel budget for West, Yusef, the orchestra and the kids, totalling $170,000.

"The most severe of these issues is a critical security vulnerability in Framework that could allow a remote attacker using a specially crafted PNG file to execute arbitrary code within the context of a privileged process", it warned.

Canada jobless rate rises despite surge in employment
Disclaimer: The views expressed in this article are those of the author and may not reflect those of Kitco Metals Inc . The number of self-employed positions, which can include unpaid work, declined by 60,700.

The Android Security Bulletin for February lists 42 vulnerabilities in the Google mobile operating system, 11 of which are critical. The good news is that Google has patched the problems with an update to Android. As pointed out by ZDNet there is no way of knowing if your device has been hacked. As always, make sure to update your Android device to the latest available version of Android as, and that you download the security updates as soon as you get any notifications. This means your Android handset is still not protected even after receiving the 2019 February update. And you'd have no way of knowing you've been targeted. The search giant also said that it has alerted its Android partners of all vulnerabilities a month before publication, adding that "source code patches for these issues will be released to the Android Open Source Project (AOSP) repository in the next 48 hours".

US officer at border crossing shoots driver going to Mexico
After shots were fired, CBP says the vehicle continued to roll across the border when Mexican authorities gave the man first aid. City officials say Army troops installed more horizontal layers of the wire along the border wall last weekend.

Craig Young, computer security researcher for Tripwire Inc.'s Vulnerability and Exposure Research Team, told SiliconANGLE that it appears that the vulnerability is directly related to how Android parses, that is interprets, an image before rendering it. It is not clear when other Android smartphone makers will release the update to their own devices.

Related news