<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>android glitch Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/android-glitch/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Mon, 08 Oct 2018 12:23:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>RAMpage – Rowhammer Variant Affecting Android Devices</title>
		<link>https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/</link>
					<comments>https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Sat, 30 Jun 2018 11:27:54 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android bug]]></category>
		<category><![CDATA[android flaw]]></category>
		<category><![CDATA[android glitch]]></category>
		<category><![CDATA[drammer]]></category>
		<category><![CDATA[rampage. rowhammer]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=4548</guid>

					<description><![CDATA[<p>In the world of security, there seems to be nothing so secured any more. Every now and then, there are new vulnerabilities found in different system. The first major ones were the Meltdown and Spectre that shook the world of security. Recently, a new vulnerability in Android has been identified that affects all the Android [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/">RAMpage – Rowhammer Variant Affecting Android Devices</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the world of security, there seems to be nothing so secured any more. Every now and then, there are new vulnerabilities found in different system. The first major ones were the Meltdown and Spectre that shook the world of security. Recently, a new vulnerability in Android has been identified that affects all the Android devices since 2012!</p>
<p>The new vulnerability has a nice name – RAMpage. The vulnerability is a variation of the Rowhammer attack. Rowhammer is a hardware bug in modern memory cards. Using the bug, researchers noticed that when someone would send repeated read/write instruction to a same row of the memory cells, it would create an electric field and the field was able to alter data stored on the nearby memory.</p>
<p>Later, researchers found that the attack was able to affect devices like virtual machines, PCs and Android devices. Researchers also found that they could execute the attack using GPU cards, JavaScript codes and even network packets.</p>
<h2>RAMpage – Rowhammer attack variation</h2>
<p><img loading="lazy" class=" wp-image-4550 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/06/RAMpage.gif" alt="" width="676" height="161" /></p>
<p>The first Rowhammer attack was named “DRammer” that would affect Android devices. This method was able to root the Android device. The current and latest version (RAMpage) is nothing more than the expansion of the previous one.</p>
<p>According to a <a href="https://vvdveen.com/publications/dimva2018.pdf">research paper</a> published recently, a team of 8 academics from 3 different universities and 2 private companies discovered this new attack.</p>
<p>According to the researchers, RAMpage can break the most fundamental isolation between user apps and the OS. A nicely crafted malicious program can use the RAMpage exploit for gaining admin control of the system and get hold of secrets from the device memory.</p>
<p>Now, once a malware gets admin privilege, it can steal any info like passwords, your personal photos etc. and even critical documents.</p>
<h2>RAMpage infecting other devices (Apple, VMs and PCs)</h2>
<p>The development of the attack is still in early stage. However, according to the researchers, the attack holds potential to work on home PCs, Apple devices and even on cloud servers. For Android devices, here’s <a href="https://vvdveen.com/drammer.apk">an app from the security researchers to check if your device is vulnerable to DRammer and RAMpage</a>.</p>
<h2>RAMpage targeting Android’s ION subsystem</h2>
<p>The difference between the DRammer and RAMpage is, the newer one specifically targets ION – an Android memory subsystem. ION is the responsible part of Android that manages memory allocation between apps and the OS. ION was introduced back in 2011 with Android 4.0 (Ice Cream Sandwich).</p>
<p>Thankfully, researchers also made a new tool that puts an additional guard in front of the ION subsystem. The guard is supposed to protect against RAMpage attack routine. You can g<a href="https://github.com/vusec/guardion">et the app from GitHub</a>.</p>
<h2>The bad news</h2>
<p>Be prepared for the bad news, folks! Researchers successfully pulled the attack on an LG4 smartphone, but the attack is able to infect other mobile devices with LPDDR2 to LPDDR4 memory. In short, that’s nearly all the Android smartphones produced since 2012!</p>
<p>Here’s a website that clarifies <a href="https://rampageattack.com/">all the information about this dangerous vulnerability</a>. The researchers encouraging people to use their apps and send the scanning result to them for getting more information and ultimately, understand the depth and making decision on next step.</p>
<p>Still not satisfied? <a href="https://www.osradar.com/upnp-ddos-attacks-are-becoming-a-reality/">Check out this new form of DDoS attack that uses UPnP for masking its identity and rendering all the DDoS mitigation method useless</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/">RAMpage – Rowhammer Variant Affecting Android Devices</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Weird Android Bug – Really WEIRD!</title>
		<link>https://www.osradar.com/weird-android-bug-really-weird/</link>
					<comments>https://www.osradar.com/weird-android-bug-really-weird/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sun, 03 Jun 2018 17:02:07 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android bug]]></category>
		<category><![CDATA[android glitch]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=3779</guid>

					<description><![CDATA[<p>Android is one of the most popular OS for smart devices. It’s powerful and highly customizable, giving developers the ability to create the best use of their hardware. There are also good security features of Android that can ensure privacy. This time, it’s a really weird bug happened to be present in Android. The bug [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/weird-android-bug-really-weird/">Weird Android Bug – Really WEIRD!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Android is one of the most popular OS for smart devices. It’s powerful and highly customizable, giving developers the ability to create the best use of their hardware. There are also good security features of Android that can ensure privacy. This time, it’s a really weird bug happened to be present in Android.</p>
<h3>The bug</h3>
<p>This bug is really funny. This bug exposes the SMS text open to the browser when searched using various terms.</p>
<p>For example, the initial report was when a user tried to access the URL “the1975..com”. Then, Google Pixel Launcher app returned the data of his SMS texts instead of the search result. The bug went public on Reddit. Eventually, there were also other Android-centered blogs who were able to reproduce the bug successfully.</p>
<p><img loading="lazy" class="size-full wp-image-3781 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch.png" alt="" width="1250" height="465" srcset="https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch.png 1250w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-300x112.png 300w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-768x286.png 768w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-1024x381.png 1024w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-696x259.png 696w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-1068x397.png 1068w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-1129x420.png 1129w" sizes="(max-width: 1250px) 100vw, 1250px" /></p>
<p>The bug also worked on other Google apps. Here are some of the terms to try out for yourself –</p>
<pre>the1976..com
thw1975..com
the1974..com
the1975..com
Izela viagens
Vizel viagens
Zela viagens</pre>
<h3>Google apps fixed</h3>
<p>Such glitch wasn’t supposed to be present. Generally, Google apps have the ability to return user’s SMS text, but that requires permission from the user himself.</p>
<p>As it appears, it’s more a “glitch” rather than a security flaw. It’s not exploitable remotely, so you’re completely safe against any possible threat due to this issue. Even if someone has physical access to your smart device, he/she is more likely to log into your Message app instead of typing some garbage &amp; meaningless text into your phone’s browser.</p>
<p>As of now, Google has already fixed the issue and released updates for Google Assistant, Pixel Launcher, Google Search and other related apps. Those should appear on your Play Store’s update section.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/weird-android-bug-really-weird/">Weird Android Bug – Really WEIRD!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/weird-android-bug-really-weird/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
