Samsung patches zero-day security flaw used to hack into its customers’ phones

Spread the love

Samsung says it’s a okay Void It is being used to hack his customers on the phone.

Phone Manufacturer. Protection errorDiscovering a software library to display images on Samsung devices, the most recent version of hackers, Android 16 allows Android 13 to plant remotely contaminated codes on the Samsung device.

Samsung’s counselor said that the security teams of Meta and WhatsApp personally informed the company on August 8 and was told that “the issue exists in an exploitation of the issue.”

Samsung has not provided a list of devices affected by weakness.

The bug is known as zero-day because the seller was not given time to fix Samsung before exploiting the bug.

It is not immediately clear how many or Samsung customers have been affected by the hacking promotion and did not respond to any request for comment sent before a Samsung spokesperson.

However, protection amendments are matched with the jerks of security updates from other phone software vendors to fight the ongoing spyware promotion.

Following Samsung’s Protection Patch Separate Protection Fixs issued by Apple and WhatsApp In August, security researchers say that both the iPhone owners and Android users were used to target the weaknesses.

WhatsApp told TechCrunch at the time that the messaging app sent the Maker affected users less than 200 notifications whose phones were target or compromised by promoting phones.

As part of it, Apple has not commented on the weaknesses patch it To say That error was used to “in a highly sophisticated attack against certain target individuals.”

Apple notifying new victims of potential spyware attacks in phases and ask them to seek assistance from them Access is now Digital Protection LabThe Recently, on September 3, Tech Giant informed an undefined number of its customers that their phones were targeted as part of spyware promotion, According to the French governmentThe

Leave a Reply

Your email address will not be published. Required fields are marked *