Just In
- 9 hrs ago OPPO Find X7 Ultra Camera Deep-Dive: Pushing the Boundaries of Photography on a Smartphone
- 10 hrs ago iQOO Z9 Turbo Launched in China: Snapdragon 8s Gen 3, 16GB RAM, and More
- 10 hrs ago iQOO Z9, Z9x Launched in China: 6000mAh Battery, iQOO 12 Inspired Design, 50MP Camera, & More
- 12 hrs ago HMD Branded First Set of Android Smartphones Are Here!
Don't Miss
- Sports Manchester United star Rasmus Hojlund ignores Al Nassr star Cristiano Ronaldo to name English legend as his dream partner
- Finance Biggest Ever Stock Splits, 49 New Shares On Existing 1 Share; FMCG Makes Big Announcement Before Splitting
- Education JEE Main Result 2024 Out, Telangana's 15 Toppers Shine, Check Statewise List of 56 Candidates with Perfect 100
- News Mangalsutra Row: Did Indira Gandhi Donate Gold During The 1962 War? The Facts Behind Priyanka's Claim
- Movies Kota Factory 3 OTT Release Date, Platform: When Will Jitendra Kumar's Web Series Premiere On Netflix?
- Lifestyle Backless Dress: 7 Tips For Choosing Perfect Bra For Backless Outfits And Turn Heads Wherever You Go
- Travel Escape to Kalimpong, Gangtok, and Darjeeling with IRCTC's Tour Package; Check Itinerary
- Automobiles Aston Martin Vantage Launched In India At Rs 3.99 Crore
Your android smartphones could be misused easily
Android, the world's favorite operating system reportedly has a flaw. This flaw can render your android smartphones easily vulnerable to external hackers say cyber experts. These researchers also claim that they can use the flaw(which is in the form of a bug) to initiate attacks & wrest control of various android phones.
An e-mail/text message which appears to be from a trustworthy source is initially sent by hackers. This e-mail/message urges users to click at a certain link. When this is done, infection spreads. This in turn damages the phones. After this, the hackers get complete control of your android smartphone which leads to the hackers eavesdropping phone calls & even monitor where the phone is located.
Experts point out that these attacks cannot be detected or disinfected by any mobile security software. Thus, smartphone users need to be extra-vigilant & must have sufficient knowledge in order to identify these potential threats. In short, prevention is better than cure.
Another alarming fact about these types of attacks is that if hackers resort to making modifications in the code embedded within these threats then every smartphone is going to be vulnerable to these types of threats. These infections reportedly originate from a security defect in a piece of software called Webkit which is implemented in various smartphones including Apple i Phone & Apple i Pad
Thus, the need of the hour is for people to obtain awareness on various types of mobile threats apart from experts coming up with anti-hacking & security solutions.
Do reply with your opinion in our comment section below.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
11,999
-
16,026
-
14,248
-
14,466
-
26,634
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804