Friday , October 30 2020

Researchers monitor a “serious gap” for spying on smartphones




<div id = "firstBodyDiv" "article-bind-html-content-type =" article "data-bind-html-compile =" body-item-data-article.body = "

"Forbes" website reported About 3 researchers, two of whom work University of Cambridge, Those that use phones "IPhone" or "Pixel 2" or "Pixel 3" very open to this type of cyber attacks.

This abusive approach is used, Programming language "JavaScript" To collect the so-called data acceleration and magnetism from smartphones when you visit an unreliable website.

If you wait one second on a site of such type, the malicious page can monitor sites or Applications You take from your computer.

To understand this attack better, it is important to note that the websites we visit collect information from the browser to place fingerprints on the device you are connecting to when you visit a specific website.

This fingerprint can monitor every Web site we visit, as long as we use the same browser and device, and this method is likely to threaten a large number of devices.

Researchers attribute this vulnerability to the weakness of the secondary processor as it is called in the device, and the higher risk appears more if we know that the implementation of this intervention is not require any interaction or endorsement from the user.

The company was told "Apple" With this vulnerability earlier and solved the problem in one of the updates, there are some "Android" devices that are still vulnerable to attack if launched.

">

According to Forbes, there are 3 researchers, two of whom work at Cambridge University, those who use "iPhone" or "Pixel 2" phones or "Pixel 3" very open to this type of cyber attacks.

This offensive method uses JavaScript to collect the so-called acceleration data and magnetism from smartphones when you visit an unreliable website.

If you wait one moment on a site like this, the page can maliciously monitor the sites or the applications you are accessing from your computer.

To understand this attack better, it is important to note that the websites we visit collect information from the browser to place fingerprints on the device you are connecting to when you visit a specific website.

This fingerprint can monitor every Web site we visit, as long as we use the same browser and device, and this method is likely to threaten a large number of devices.

Researchers attribute this vulnerability to the weakness of the secondary processor as it is called in the device, and the higher risk appears more if we know that the implementation of this intervention is not require any interaction or endorsement from the user.

Apple was informed of this vulnerability earlier and solved the problem in one of the updates, while some of the devices, "Android" are still vulnerable to attack at the event that launched t .


Source link