Live
- All you need to know about PAN 2.0
- Akasa Air redefines travel experience with industry-first offerings
- MP: Residents stage protests against liquor shop in Indore
- Telugu Actor Shri Tej Booked for Alleged Cheating and False Promise of Marriage in Live-in Relationship
- Toyota Kirloskar Motor Celebrates 1 Lakh Urban Cruiser Hyryder on Indian Road
- MLS: New York City FC part ways with head coach Nick Cushing
- Delhi CM says Centre cutting AAP voters’ names from rolls, BJP hits back
- Hyderabad Metro Rail Phase-II Works to Begin in Old City in January 2025
- Odisha: 668 persons killed in human-elephant conflicts in last three years
- DEFENDER JOURNEYS: TO EMBARK ON ITS THIRD EDITION FROM NOVEMBER 2024
Just In
High-Risk Alert for Android Users by CERT-IN: How to Protect Your Device
India's CERT-IN warns Android users of a high-risk vulnerability and offers essential steps to secure devices.
India's cybersecurity watchdog, the Indian Computer Emergency Response Team (CERT-In), has identified a critical vulnerability affecting several Android versions. The agency has issued a high-severity risk alert, urging users to take immediate action to safeguard their devices.
CERT-In has flagged this high-risk vulnerability in Android versions preceding 12, 12L, 13, and 14. According to CERT-In, if this flaw is exploited, it could enable hackers to "gain elevated privileges and obtain sensitive information on the targeted system." This means that affected devices could be compromised, allowing attackers to access and steal sensitive information.
The cybersecurity agency pinpointed the source of these vulnerabilities, stating they are due to "flaws in the Framework, System, Google Play system updates, Kernel, Arm components, MediaTek components, Imagination Technologies, Qualcomm components, and Qualcomm close-source components." Essentially, this implies that users with devices running on Android versions before 12, 12L, 13, and 14 are at risk due to a combination of issues in these areas. Delays in components from Arm, MediaTek, Imagination Technologies, and Qualcomm have also contributed to this security threat.
To mitigate the risks associated with this vulnerability, CERT-In recommends the following precautionary measures:
Regularly Check and Update Your Device
Ensure your device is running the latest version of Android. Regularly check for system updates and install them promptly, as these updates often include security patches that address known vulnerabilities.
Activate Automatic Updates for OS and Apps
Activate automatic updates for both your operating system and apps. This ensures you receive the latest security patches and updates as soon as they are available, minimizing your exposure to vulnerabilities.
Download Apps only from Trusted Sources
Only download apps from reputable sources like the Google Play Store. Avoid installing apps from unknown or third-party sources, as they might contain malicious software designed to exploit vulnerabilities.
Regularly Review App Permissions
Regularly review the permissions granted to your apps. Be wary of apps requesting access to sensitive information or unnecessary permissions. Revoke permissions that seem excessive or unrelated to the app's function.
Install Reputable Security Software
Consider installing reputable security software on your device. These apps can offer an additional layer of protection by detecting and blocking malicious activities.
Don't Click on Unknown Links
Be cautious of unsolicited messages, emails, or links, especially those asking for personal information or credentials. Phishing attacks are common methods for hackers to exploit vulnerabilities.
Regular Backup of your Data
Regularly back up your data to an external source or cloud service. If your device is compromised, having a backup ensures you can restore your information without significant loss.
Track Your Device Activity
Keep an eye on your device's activity for any unusual behaviour, such as sudden slowdowns, unexpected pop-ups, or unfamiliar apps. These could be signs of a security breach.
Factory Reset If Your Device is Compromised
If you suspect your device has been compromised, consider performing a factory reset. This will erase all data on your device, including any malware, but be sure to back up important data first.
By following these steps, users can significantly reduce their risk of falling victim to potential attacks exploiting the identified vulnerabilities. The timely update and diligent monitoring of device activity are crucial to maintaining device security and protecting sensitive information.
In conclusion, the high-severity risk alert issued by CERT-In underscores the importance of vigilance and proactive measures in safeguarding Android devices. Users are encouraged to stay informed about updates and security practices to ensure their devices remain secure against emerging threats.
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com