![]() ![]() StageFright’s popularity made it the first mobile-only threat featured on WatchGuard Threat Lab’s top-ten list of hacking attacks detected by IPS in 2017. And while it’s most effective on Android devices running stock firmware like Nexus 5, it’s known to function on the customized Android variants running on phones like the Samsung Galaxy S5, LG G3 and HTC One. It seems laborious, but it works within a matter of seconds: a typical StageFright attack breaks into a device within 20 seconds. For this reason, the attack could take place without users even finding out. Several text messaging applications - including Google Hangouts - automatically process videos so the infected video is ready for users to watch as soon as they open the message. ![]() StageFright can use videos sent through MMS as a source of attack via the libStageFright mechanism, which assists Android in processing video files.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |