
The exploit works by highjacking a legitimate app as it217;s launched on almost any Android phone. Instead of going to the welcome screen or login page, the exploit allows a piece of malware to display so-called permissions pop-ups, the kind that asks if the app can access your contacts, location, and stored data. When you approve the request, the malware is given all of the permissions instead of the legitimate app, which continues to run as if nothing happened.
Source link
thanks you RSS link
( https://www.coindesk.com/global-android-vulnerability-could-grab-wallet-and-banking-data)
more link ADS
Blockchain, bitcoin, ethereum, blockchain technology, cryptocurrencies
Information Security, latest Hacking News, Cyber Security, Network Sec
Information Security, latest Hacking News, Cyber Security, Network Security Blog! Development Software and Application Mobile Development apps, Android, Ios anh Tranning IT, data center, hacking Car News, Reviews, Pricing for New & Used Cars, car reviews and news, concept cars
Information Security, latest Hacking News, Cyber Security, Network Security Blog! Development Software and Application Mobile Development apps, Android, Ios anh Tranning IT, data center, hacking Car News, Reviews, Pricing for New & Used Cars, car reviews and news, concept cars