Malware has been always a weak point of android but if you are not altering your phone and using it you'll most probably be in the safe zone. Well in a new report by XDA-Dev shows that a new exploit discovered proved to be harmful to Samsung flagship devices using the Exynos chipset. These devices include:
Source: Android Authority
Subscribe to our blog for up to date tech content or you can follow us on Twitter, add us to your circles in Google+, & like our Facebook page to be updated with the latest tech content. Samsung Galaxy S IV News & Rumors. Tip us about something we are not aware of
- Samsung Galaxy S2 GT-I9100
- Samsung Galaxy S3 GT-I9300
- Samsung Galaxy S3 LTE GT-I9305
- Samsung Galaxy Note GT-N7000
- Samsung Galaxy Note 2 GT-N7100
- Verizon Galaxy Note 2 SCH-I605 (with locked bootloaders)
- Samsung Galaxy Note 10.1 GT-N8000
- Samsung Galaxy Note 10.1 GT-N8010.
Hi,Recently discover a way to obtain root on S3 without ODIN flashing.The security hole is in kernel, exactly with the device /dev/exynos-mem.This device is R/W by all users and give access to all physical memory … what’s wrong with Samsung ? […]The good news is we can easily obtain root on these devices and the bad is there is no control over it.Ram dump, kernel code injection and others could be possible via app installation from Play Store. It certainly exists many ways to do that but Samsung give an easy way to exploit. This security hole is dangerous and expose phone to malicious apps. Exploitation with native C and JNI could be easily feasible.This can be a good thing to modders because rooting the device is much more easier but it still has some vulnerabilities. This problem has been notified to Samsung and an explanation is yet to be released.
Source: Android Authority
Subscribe to our blog for up to date tech content or you can follow us on Twitter, add us to your circles in Google+, & like our Facebook page to be updated with the latest tech content. Samsung Galaxy S IV News & Rumors. Tip us about something we are not aware of
No comments :
Post a Comment