security

Urgent warning to all Android owners to change settings as Google reveals ‘active’ attack – take action tod… – The US Sun


MILLIONS of Android phone owners must update their handsets as soon as possible.

That’s according to leading cyber-experts who warn that three security flaws are currently being exploited by crooks.

Millions of Android phones need to be updated for the latest security protectionsCredit: Google

In the latest Android update, Google fixed dozens of flaws – but three are particularly dangerous.

That’s because they’re being actively used by cyber-criminals, according to a leading cybersecurity firm.

“In July’s update for the Android operating system (OS), Google has patched 43 vulnerabilities, three of which are actively exploited zero-day vulnerabilities,” Malwarebytes Labs explained.

“The security bulletin notes that there are indications that these three vulnerabilities may be under limited, targeted exploitation.

“If your Android phone is at patch level 2023-07-05 or later then the issues discussed below have been fixed.”

The updates have been offered to affected users running Android 10, 11, 12, 12L and 13.

You can check your Android version number by going into your Settings app.

Thankfully the fix is very easy: you just have to update your phone.

Go into Settings then look for About Phone or About Device.

Then you can tap on Software Updates to see if there any new downloads available.

If there’s nothing there, you’re already running the latest version of Android.

It’s important to regularly install software updates, as they can prevent dangerous cyberattacks.

If your Android phone is so old that it no longer receives software updates, you should consider upgrading.

Readers Also Like:  The Ghost of Privacy Past Haunts the Senate's AI Future - WIRED

Depending on your Android model, your handset might be out of date after just a few years.

If you don’t upgrade, you risk being locked out of future software updates that can protect you against dangerous cyberattacks.



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.