Rowhammer: Researchers claim attack on Android using memory security weakness

clock • 2 min read

Hardware-based attack requires no software vulnerability or user permission

Security researchers will this week demonstrate a new class of hardware-based attacks that, they claim, could enable hackers to acquire root access to Android devices without exploiting any softwar...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Appdome - DevOps Excellence Awards finalist, Best DevOps Security Tool

DevOps

Mobile brands need cyber defences in their mobile apps

clock 11 March 2024 • 2 min read
Android password managers vulnerable to 'AutoSpill' attack, researchers warn

Threats and Risks

Exploits a weakness in autofill functionality

clock 11 December 2023 • 2 min read
WhatsApp exploits commanding multi-million prices

Hacking

Security advances have made hacking an expensive endeavour.

clock 06 October 2023 • 2 min read

More on Security

Vanta: Cybersecurity spend should be 30% of the IT budget

Vanta: Cybersecurity spend should be 30% of the IT budget

Currently it's 9% in the UK

clock 03 May 2024 • 4 min read
Security Excellence Awards – winners revealed!

Security Excellence Awards – winners revealed!

The technologies, projects, partners and people leading the way in cybersecurity

clock 03 May 2024 • 2 min read
Next's CISO: Learn from attackers to boost cyber defences

Next's CISO: Learn from attackers to boost cyber defences

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

Tom Allen
clock 02 May 2024 • 4 min read