StrandHogg vulnerability enables malicious software to masquerade as trusted Android apps

clock • 2 min read

The vulnerability stems from a multitasking feature in Android

Researchers have discovered  a security vulnerability in the Android OS that could allow attackers to run malicious processes on a phone without the user's knowledge. The vulnerability, dubbed S...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like

Strategy

Oracle sued Google in 2010 over its unlicensed use of Java APIs in the Android operating system

clock 08 January 2020 • 2 min read

Operating Systems

HongMeng OS expected to launch in October alongside the Mate 30 Pro smartphone

clock 09 July 2019 • 2 min read

Mobile

Tom Lysemose Hansen, founder and CTO of Promon, warns more care needs to be taken with mobile security

clock 13 August 2015 • 2 min read
Most read
01
02

IT Essentials: Regulators hate this one simple trick

02 September 2024 • 3 min read
04

Brazil bans X

02 September 2024 • 3 min read
05

Elastic returns to the open source fold

30 August 2024 • 4 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read