Test your smartphone is infected Android Is Vulnerability recent detections put SOP security
https://walkprod.blogspot.com/2014/09/test-your-smartphone-is-infected.html
Everyone knows that Google are major effort regarding tinkering security loopholes and maintaining the security of users, as it works to urge users to update system Android their own version 4.4, where a quarter of Android users only use this version as it is characterized by the fact that vulnerabilities discovered by the limited and most of them are Trgiah, unlike older versions, which contain many of the security holes which are Trgiah including who still many hackers use it to this day, and regarding this matter have been discovered security flaw recently is one of the serious gaps, so it is necessary to find out whether your device is infected with this critical gap and this what we'll cover in this post.
Gap at the level browsers default or the Android Browser versions of old where the company has Google changed the default browser to browser, Google Chrome to Release 4.2 but left with a browser Alandroed old, unlike version 4.4, which is available on the Google Chrome Kmtcefh default only thing that does not make him vulnerable to this gap, so responsibility lies on the handset manufacturers rather than users who are not making a lot of their publications, and that is true: most do not know how to do so.
Here we come to a simple explanation for the gap; Everyone knows that when a particular site you are importing data server or website content in general terms that enabled certain works on this site to modify some of its properties is not able amendment on the properties of another site and this is quite clear, where there is a property security or the security situation is called short for SOP (Same-origin policy) which is responsible for the situation to prevent such a thing. Where if JavaScript enabled location of malignant (mg) Poluge you can not engage him another site and here lies the seriousness of this loophole where they can bypass this security situation. The thing that means that when penetrate a particular site by Android Browser or by applications that use the latter it can steal your sensitive data, such as the use of cookies and other gaps (malicious codes) again.
To do a simple test tells you whether your system is infected Vulnerability visit the following test page and press
the test or test.
If your device is infected Vulnerability you'll see a pop-up message or Popup Message Fjhazak it is not infected Vulnerability.
So what's the solution?
Working Google on tinkering gap considering the deployment patching is very difficult, and bearing manufacturers responsibility of it, especially that the technical support of these companies end up in two years and therefore Most devices will be affected in the absence of the update, and what makes it worse is that there are still many applications running on the base of the old default browser to import content of these Internet applications, the thing that means that the gap is still to be tapped. It remains a partial solution we are proposing is to work on the metal as other browsers and Firefox browsers and make it the default and avoid applications that integrate Android Browser in its work.
Post a Comment