NEWS

Govt issues high risk warning for Android users: Here is what you need to do

The Indian Computer Emergency Response Team (CERT-In) has spotted a high risk vulnerability in Android versions prior 12, v12L, v13, and v14. Owing to that, the agency has issued a high severity risk alert warning users against the security flaw. CERT-in says that, if exploited, the vulnerability could allow hackers to “gain elevated privileges and obtain sensitive information on the targeted system”. Which means that affected users’ devices could be taken over by a hacker, who can in turn access and steal sensitive information from a victim’s device.

Also Read- THESE NHAI Rules Guarantee FREE Passage To Cars At Toll Plazas; Know What They Are

The cybersecurity agency says that these vulnerabilities exist in Android due to “flaws in the Framework, System, Google Play system updates, Kernel, Arm components, MediaTek components, Imagination Technologies, Qualcomm components and Qualcomm close-source components”. This essentially means that if you are a user and your device runs on Android versions prior to Android 12, Android 12L, Android 13, and Android 14, then several reasons, including issues in the Framework, System, Google Play updates, Kernel, have come together to cause this vulnerability. There has also been a lag in the components from Arm, MediaTek, Imagination Technologies, and Qualcomm, which, as per CERT-In, has also caused the security risk.

To protect against such high-risk vulnerabilities, users can take several precautionary steps:

Update your device: The first and foremost step is to ensure your device is running the latest version of Android. Regularly check for system updates and install them promptly. These updates often contain security patches that fix known vulnerabilities.

Enable automatic updates: Enable automatic updates for both your operating system and apps. This ensures that you receive the latest security patches and updates as soon as they are available, reducing the risk of exposure to vulnerabilities.

Also Read– After Monday Mayhem, Mumbai Braces Up For More Rains As IMD Issues ‘Yellow Alert’ For Next 3 Days | Check Latest Forecast

Use trusted sources: Only download apps from trusted sources like the Google Play Store. Avoid installing apps from unknown or third-party sources, as they may contain malicious software designed to exploit vulnerabilities.

Review app permissions: Regularly review the permissions granted to your apps. Be cautious of apps requesting access to sensitive information or unnecessary permissions. Revoke permissions that seem excessive or irrelevant to the app’s function.

Install security software: Consider installing reputable security software on your device. These apps can provide an additional layer of protection by detecting and blocking malicious activities.

Avoid clicking on unknown links: Be cautious of unsolicited messages, emails, or links, especially those that ask for personal information or credentials. Phishing attacks are common methods for hackers to exploit vulnerabilities.

Read More: Jagannath Temple’s Ratna Bhandar Set To Open On July 14 After 40 Years: Devotees Await Glimpse Of Priceless Treasures

Regular backups: Regularly back up your data to an external source or cloud service. In case your device is compromised, having a backup ensures you can restore your information without significant loss.

Monitor device activity: Keep an eye on your device’s activity for any unusual behaviour, such as sudden slowdowns, unexpected pop-ups, or unfamiliar apps. These could be signs of a security breach.

Factory reset: If you suspect your device has been compromised, consider performing a factory reset. This will erase all data on your device, including any malware, but be sure to back up important data first.

Source :
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Most Popular

To Top