Skip to main content

Warning: Devices Running Android Versions 12, 12L, 13, or 14 at high Risk.

 

The Indian Computer Emergency Response Team (CERT-In) has issued a warning to Android users. The cyber security authority has spotted “high risk” vulnerabilities on Android smart phones powered by Qualcomm and MediaTek chipsets. It added that the smartphones affected are running on Android versions 12, 12L, 13, and 14 software.

These multiple vulnerabilities can be exploited by an attacker to get access to sensitive information and gain elevated privileges. As per the warning, these vulnerabilities exist in Android due to flaws in the Framework, System, Kernel, Arm component, Imagination Technologies, MediaTek components, Qualcomm components and Qualcomm closed-source components.

Notably, the critical security flaw identified in the Framework component poses a risk of privilege escalation, allowing attackers to gain elevated access without any additional execution privileges. The severity of this vulnerability is determined by its potential impact on affected devices, assuming that typical security measures are disabled or successfully evaded.

To protect your Android Smartphone from this potential security threat, to update to the latest version of Android where possible. Additionally, turn on auto-updates so that your software operating system is up to date, minimizing the possibility of such security threats. Make sure that you download apps from trusted platforms only like Google Play Store. It is also advised not to click on links sent via unsolicited messages, email and more.

CERT-In has also issued a “severe” warning for Apple users who own iPhones, iPads, Macs, and more regarding multiple vulnerabilities. As per the warning, these vulnerabilities can expose users to risks like information leaks, unauthorized code execution, security bypasses, denial of service (DoS) attacks, and spoofing attacks.

The advisory stated, “Multiple vulnerabilities have been reported in Apple products which could allow an attacker to access sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service (DoS) and perform spoofing attacks on the targeted system”.














Popular posts from this blog

Cybersecurity Giant CrowdStrike Triggers Worldwide Computer to Blue Screen of Death

    Recently, a widespread issue has paralyzed computers globally, initially mistaken for a cyber attack. Speculations pointed fingers at Microsoft, as only Windows systems seemed affected. However, the real culprit was CrowdStrike, a major cybersecurity firm renowned for its endpoint protection services, akin to antivirus for corporate fleets of computers. The problem stemmed from an automatic update pushed by CrowdStrike, designed to enhance security through its endpoint sensors. Unfortunately, a critical bug slipped into the update, causing affected computers—running CrowdStrike's software—to crash irreparably. Since the sensors operate at a deep system level, the glitch caused entire systems to enter a continuous cycle of crashes, known ominously as the "blue screen of death." CrowdStrike quickly acknowledged the issue and provided a fix, albeit a cumbersome one. Affected PCs must be manually booted into safe mode to remove specific files, a process that needs to be r...

Grok 3: The AI Chatbot Breaking Boundaries with Bold, Uncensored Responses

  In the ever-evolving world of artificial intelligence, Grok 3 is quickly making waves both for its cutting-edge capabilities and its shocking, unfiltered personality. Developed by Elon Musk’s xAI, Grok 3 is an AI chatbot that has taken the internet by storm, especially among regular X (formerly Twitter) users in India. Known for its snarky responses, irreverent tone, and ability to learn from the unpredictable and sometimes profane language of users, Grok 3 is far from your average chatbot. Launched in February 2025, Grok 3 is a powerhouse of computational prowess, utilizing 12.8 trillion tokens to deliver responses that range from wildly intelligent to oddly rebellious. It’s trained with data from a variety of sources everything from legal filings to X posts giving it a diverse range of knowledge and a unique ability to engage in conversation that feels real, yet sometimes, unsettlingly raw. But it’s not just Grok 3’s wealth of knowledge that’s making headlines. The chatbot ...

AI tools on the dark web

  As AI continues to develop, its role in cybercrime on the dark web will only increase. The ability of cybercriminals to experiment with AI-powered tools is a new frontier in the ongoing war between hackers and cybersecurity experts. The Dark Web is quickly becoming a testing ground for new AI-powered attacks. The bad actors can customize their methods and expand their scope of their crimes. 1. FraudGPT – When AI is the worst spammer FraudGPT is a tool that sends fake emails. Create a fraudulent website And it spreads malware like a 24/7 scam operation. It's so clever it can trick you into handing over sensitive information to hackers—just like your grandma's bank details! If installed correctly, it does not require too much energy to operate. 2. Angler AI – A fishing tool that personalizes your attacks. Angler AI is a secret tool. That changes perspective depending on how you respond. It's like a telemarketer who knows everything about you and can even pretend to be y...