Connect with us

Hi, what are you looking for?

DOGE0.070.84%SOL19.370.72%USDC1.000.01%BNB287.900.44%AVAX15.990.06%XLM0.080.37%
USDT1.000%XRP0.392.6%BCH121.000.75%DOT5.710.16%ADA0.320.37%LTC85.290.38%
THE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & LifestyleTHE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & Lifestyle

Technology

Technology

Researchers Hack Gmail with 92 Percent Success Rate

via flickr/Bhupinder Nayyar via flickr/Bhupinder Nayyar
via flickr/Bhupinder Nayyar via flickr/Bhupinder Nayyar

Researchers from the University of California Riverside Bournes College of Engineering and the University of Michigan have exposed a weakness that they feel may exist in Android, iOS and Windows operating systems that could enable malevolent applications to snag personal information. There’s one ability that all apps share that poses the biggest threat to smart phone security-that is, the ability to access a phone’s shared memory.

UC Riverside associate professor Zhiyun Qian said, in a CNET interview, “The assumption has always been that these apps can’t interfere with each other easily. We show that assumption is not correct and one app can in fact significantly impact another and result in harmful consequences for the user.”

Researchers demonstrated the vulnerability of attacks to apps on an Android phone. An apparently harmless app, like wallpaper, can be the starting point for stealing vital information. The researchers showed they could then access shared memory statistics and connect changes in the stats to numerous activities, from checking email to taking a picture of a check to deposit it through Chase Bank. Gmail, H&R Block and Chase Bank proved to be the most vulnerable to attacks; researchers logged an attack success rate between 82% and 92%.

Two things must happen for a successful attack. The attack must happen at the exact moment that an action is taking place, such as logging in to a banking app. Next, the attack must happen without the user noticing it. Qian recommended Windows, iOS and Android users to avoid untrusted apps and to pay close attention to the permissions and information access that even trusted apps require.


Comment Template

You May Also Like

Technology

Apex Legends Esports Final Postponed Due to Hack Allegations The North American esports final of the popular online shooter game Apex Legends has been...

Technology

Google Rejects Claims of Gmail Shutdown Amid Viral Hoax Google has unequivocally stated that Gmail is “here to stay” following the rapid spread of...

Breaking News

On Monday, the Nomad cross-chain token bridge was attacked, and the attackers practically drained the protocol of all its cash. Nearly $200 million worth...

Business

According to a recent report by security-focused ranking platform CertiK, centralization issues have emerged as the main attack vector in decentralized finance (DeFi), facilitating...

Notice: The Biznob uses cookies to provide necessary website functionality, improve your experience and analyze our traffic. By using our website, you agree to our Privacy Policy and our Cookie Policy.

Ok