It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
In this blog, we’ll explain the vulnerabilities discovered (CVE-2019-2234), provide details of how they were exploited, explain the consequences, and note how users can safeguard their devices. This blog is also accompanied by a proof-of-concept (PoC) video, as well as a technical report of the findings that were shared with Google, Samsung, and other Android-based smartphone OEMs. Google & Samsung Camera Vulnerabilities After a detailed analysis of the Google Camera app, our team found that by manipulating specific actions and intents [2], an attacker can control the app to take photos and/or record videos through a rogue application that has no permissions to do so. Additionally, we found that certain attack scenarios enable malicious actors to circumvent various storage permission policies, giving them access to stored videos and photos, as well as GPS metadata embedded in photos, to locate the user by taking a photo or video and parsing the proper EXIF data [3]. This same technique also applied to Samsung’s Camera app. In doing so, our researchers determined a way to enable a rogue application to force the camera apps to take photos and record video, even if the phone is locked or the screen is turned off. Our researchers could do the same even when a user was is in the middle of a voice call.
originally posted by: Waterglass
a reply to: Flyingclaydisk
I was also thinking the same thing.
I sometimes wonder if all this stuff isn't all just fear mongering to sell other stuff like apps and software.
Also, I really wonder why I cant simply block a person from calling me on my Android phone. I called the provider and they said they are not allowed to totally prevent a caller from calling my phone.
The whole anti-virus industry was created by blowing threats way out of proportion.
Ransomware attacks in US cities are using a stolen NSA tool The consequences of NSA code leaks are hitting home.