{"id":89112,"date":"2020-05-27T11:30:10","date_gmt":"2020-05-27T06:00:10","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=89112"},"modified":"2020-05-27T11:30:10","modified_gmt":"2020-05-27T06:00:10","slug":"can-mobile-phone-hacked-implanting-bugs-android","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/can-mobile-phone-hacked-implanting-bugs-android\/","title":{"rendered":"Can your mobile phone be hacked by implanting bugs in Android?"},"content":{"rendered":"<p>If you\u2019re among the many who own an Android phone, you must have by now downloaded the popular operating system\u2019s latest <a href=\"https:\/\/source.android.com\/security\/bulletin\/2020-05-01\" target=\"_blank\" rel=\"noopener\">security<\/a> update (released on 5th May) by Google.<\/p>\n<p>The update fixes multiple vulnerabilities within the OS including CVE-2020-0103 which is the severest. This vulnerability could potentially allow remote code execution on an Android-enabled smartphone. This is what Google says in their release: \u201cThe most severe of these issues is a critical security vulnerability in the System component that could enable a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process.\u201d<\/p>\n<p><strong>Major security risk for Android users<\/strong><\/p>\n<p>The ramifications of this vulnerability are significant from a security perspective. Depending on the privileges associated with the application, an attacker could potentially hijack an Android device, go to the extent of installing programs, viewing, changing or deleting data and even create new user accounts with full rights.<\/p>\n<p>The Center for Internet Security (CIS) <a href=\"https:\/\/www.cisecurity.org\/advisory\/multiple-vulnerabilities-in-google-android-os-could-allow-for-arbitrary-code-execution_2020-059\/\" target=\"_blank\" rel=\"noopener\">states<\/a> that the risks of not installing this security update are high for all types of end-users \u2013 Home Users, Small Business Entities, Large and Medium Business Entities, Small Government Entities and Large and Medium Government Entities.<\/p>\n<p>A <a href=\"https:\/\/www.theregister.co.uk\/2020\/05\/08\/samsung_android_patches\/\" target=\"_blank\" rel=\"noopener\">report<\/a> by The Register also analyzed the vulnerability and found out that exploitation could happen on a Samsung phone with a messaging app installed before 2015 without any user interaction. Even just a malicious MMS could trigger the vulnerability, enabling code execution on the device and allowing an attacker to gain control.<\/p>\n<p><strong>Be careful what you download<\/strong><\/p>\n<p>Apart from ensuring that you have the latest security updates for your Android phone, you can also stay safe from being exploited by this vulnerability by following some basic guidelines.<\/p>\n<p>\u00b7 It\u2019s important to download only trusted applications on your device. Malicious attackers often embed malware in innocuous-looking apps (e.g. in a gaming app). In many cases, a user may not even know that they have malware in their phones.<\/p>\n<p>\u00b7 Ensure that the applications you download are only from trusted vendors in the Google Play Store<\/p>\n<p>\u00b7 Be wary of opening links or websites that you are unable to verify<\/p>\n<p>\u00b7 Do not click on or open emails from senders you do not recognize<\/p>\n<p>\u00b7 Install security solutions and keep them updated<\/p>\n<p><strong>The Quick Heal difference <\/strong><\/p>\n<p><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-android\" target=\"_blank\" rel=\"noopener\">Quick Heal Total Security for Android<\/a> can help to keep your Android phone safe, thanks to smart features designed to keep vulnerabilities out.<\/p>\n<p>\u00b7 <strong>Vulnerability Scan<\/strong> \u2013 Vulnerabilities of certain applications on your phone are scanned and brought to your notice by the Vulnerability Scan feature<\/p>\n<p>\u00b7 The <strong>Message Center<\/strong> displays important notifications at your fingertips. The latest IT news, security news, and alerts about new threats can be seen at a glance, ensuring you\u2019re aware of the latest updates.<\/p>\n<p>\u00b7 The <strong>Scan Before Download<\/strong> feature automatically scans apps even before they are downloaded from the Google Play Store with details provided on whether the app is safe to install or not.<\/p>\n<p>\u00b7 The <strong>On Install App Scan<\/strong> feature scans newly installed apps on the device to detect and present threats<\/p>\n<p>\u00b7 The <strong>News featur<\/strong>e serves the latest news and alerts from the Quick Heal Security Lab providing all the news about computer and mobile protection<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re among the many who own an Android phone, you must have by now downloaded the popular operating system\u2019s latest security update (released on 5th May) by Google. The update fixes multiple vulnerabilities within the OS including CVE-2020-0103 which is the severest. This vulnerability could potentially allow remote code execution on an Android-enabled smartphone. [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":89113,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-89112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89112"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89112"}],"version-history":[{"count":3,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89112\/revisions"}],"predecessor-version":[{"id":89117,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89112\/revisions\/89117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89113"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}