kooora world

  • 22/2/2016 - 7:35 م

    ريال مدريد
    3-2
    روما
javascript:void(0)

Popular Posts

What’s Hot

Security gap 2016

New security flaw threatens more than 66% of Android devices and millions of computers to Linux.
In Android 4.4 onwards, any application can manipulate the powers and execute the orders at the level of the operating system layers system. 

Perception Point announced the company specialized in the field of electronic protection for the discovery of a new vulnerability in the Linux kernel system able to overthrow more than 66% of the operating system Android devices and millions of computers operating system Linux.

The company said in its statement that the new gap, which bearing the number CVE-2016-0728, has been around since version 3.8 of the Linux kernel, which was issued in 2012, which threatens the existence of millions of devices that rely on this kernel.

And allow new loophole for hackers to obtain the full powers of the Director, any user who has the authority on the Linux server system can be exploited and access to the powers of the root Root. In Android 4.4 onwards, any application can manipulate the powers and execute the orders at the level of the core operating system layers system and thus control the device without restrictions.

The company said the vulnerability threaten millions of computers, servers, operating system Linux, also threatens more than 66% of Android devices in particular it is used on the system more than 1.4 billion smart device around the world.

The company did not yet monitored any exploitation of a loophole in public, but the devices will remain vulnerable to exploitation in any unless they are tinkering with the Linux kernel and the Android system as soon as possible time.

The University of Cambridge, UK, published in the October / October of 2015, a research study which said that 87% of Android devices are susceptible to security holes, also noted the need to put more effort by the hardware makers to protect the devices from the old security vulnerabilities.

0 comments:

Post a Comment