Just In
- 8 hrs ago Nothing Ear, Ear (a) With ANC, Up to 42.5 Hours of Battery Launched; Check Price and Availability
- 8 hrs ago Google Drive Gets Long-Awaited Dark Mode for Web - Here's How to Activate
- 9 hrs ago Vivo V30e Launch in India Teased 50 MP Sony IMX882 Camera, 5,500 mAh Battery Confirmed
- 10 hrs ago AMD Revamps Business Computing with AI-Fueled Ryzen PRO 8000 Series Processors
Don't Miss
- Finance Rs 95/Share Dividend: Record Date On 28th June; Buy Mahindra Group Stock To Be Eligible?
- Lifestyle Kamada Ekadashi 2024 Wishes: Greetings, Messages, Texts, Images, Twitter Status And Instagram Captions
- Sports Who Won Yesterday's IPL Match 33? PBKS vs MI, IPL 2024 on April 17: Mumbai Indians Escape Last-Ditched Fight by Punjab Kings To Win
- Movies Do Aur Do Pyaar OTT Release Date & Platform: When & Where To Watch Vidya Balan’s Film After Theatrical Run?
- News BRS Chief K Chandrasekhar Rao Slams BJP, Says K Kavitha's Arrest Is Vendetta Politics
- Automobiles Aprilia RS 457 Accessories: A Detailed Look At The Prices
- Education Karnataka SSLC Result 2024 Soon, Know How to Check Through Website, SMS and Digilocker
- Travel Telangana's Waterfall: A Serene Escape Into Nature's Marvels
Section of Mediatek powered Smartphones officially confirmed to be Vulnerable to Attacks
After initial rounds of rumours, Mediatek has officially confirmed the presence of a bug in their recent generation of chipsets which have put various smartphones at risk.
The vulnerability was originally reported by security researcher Justin Case earlier this month. Apparently the vulnerability is caused by the presence of a bug that could possibly allow an attacker to remotely enable root access in the affected device.
SEE ALSO: 10 E-Mail Etiquette You should Follow
By rooting your device the attacker can access various data including those which are normally protected by the smartphone manufacturer themselves. Chase further mentioned that the attack can easily brick a phone or spy on a user remotely utilizing this vulnerability.
Today Mediatek has officially come up with an explanation to this issue, stating that not at all but a indeed a small portion of their user base is under this vulnerability threat. Interestingly the Chinese chipset vendor claims that only device running Android KitKat are under the risk of being a subject to this recently discovered hack.
So Mediatek broke basic security features to have this backdoor work. Readonly properties are NOT read only! pic.twitter.com/pEjtMNpo9v
— Justin Case (@jcase) January 13, 2016
Officials from the company state that the vulnerability originates from a debug feature that come with the chipset for testing telecommunication inter-operability in China. In fact the MediaTek spokesperson's claims that it's a responsibility of the smartphone manufacturer to disable the debug feature before shipping their products. In fact most of their partners disable it before shipping their products. However a few manufacturer didn't disable this feature, thereby resulting in this potential security issue.
SEE ALSO: Is your smartphone down with virus? Here is what you need to do
While Mediatek weren't ready to divulge further information in this regard, the official from the company stated that they have alerted all the manufacturers about the feature and its possible risk.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599
-
8,893