During the PacSec conference in Tokyo yesterday, MobilePwn2Own demoed a vulnerability in Chrome that exploits the JavaScript v8 engine and allows malicious hackers to install an application on Android without any user interaction at all. PacSec organiser Dragos Ruiu says that this exploit is rare because “it was one shot” and that most people “have to exploit several vulnerabilities” to load software without user interaction.
Subscribe to:
Post Comments (Atom)
Featured Post
Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
Popular Posts
-
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
-
Following the release of iOS 10.3.2 on May 15, Apple has stopped signing iOS 10.3.1, the previous version of iOS that was available to consu...
No comments:
Post a Comment