Google Pixel Hackers with Zero-Day Exploit

Alex Hernandez | April 4, April 202444, 2024Android, Google, Mobile, Technology

Oh, the world of device and PC security never stops spinning. Be careful, kids, because there is security in tasks when running on PCs and device security. Not a week, or even a day, goes by without a new safety factor being reported. . This time, the Google Pixel smartphone is the target of hackers. Tomorrow, it might just be the iPhone or some other software. This is what’s happening with the Google Pixel zero-day exploit.

Estimated time: 3 minutes

According to security researchers at GrapheneOS, a company that makes a more secure edition of Android, hackers took advantage of zero-day vulnerabilities to attack Google Pixel smartphones. Google has issued an advisory related to recently discovered insects that are being used for targeted attacks. There are indications that the following may be subject to limited and selective exploitation,” the notice reads.

Please allow JavaScript

According to PCMag, it doesn’t appear that classic cybercriminals or cyberspies have abused vulnerabilities to attack phones remotely. Google attributes the discovery of Day Zero to Daniel Micay, a cybersecurity researcher and founder of GrapheneOS, an Android-based operational formula aimed at security. According to GrapheneOS, “forensic firms” exploited the vulnerabilities to gain knowledge of Pixel phones. Google Pixel The rear camera of the Google Pixel 7a Android smartphone. The first vulnerability, CVE-2024-29745, affects the Pixel series bootloader, which stores the operating formula in the phone’s memory. The second vulnerability, CVE-2024-29748, can allow an attacker to “override an activated factory reset. “through a device management app. “

Google plans to roll out security patches for Google Pixel smartphones soon, so be sure to get updates for that. If you want to dig a little deeper into the vulnerabilities, PCMag takes a little more in-depth look at them in their article, so be sure to take them out.

What do you think of this zero-day exploit? You can comment on the social media buttons below. Share on your favorite social media site and tag us on Facebook, X, MeWe and LinkedIn. Or register on our Telegram channel here.

In some of our articles and especially in our reviews, you will find links from Amazon or other links from associates. As Amazon associates, we earn from qualifying purchases. Any other purchases you make through those links result in a small amount earned for the site and/or our publishers. Techaeris covers press releases with the logo. This does not constitute an endorsement of any Techaeris product or service. We provide the data from the press release so that our audience is informed and makes their own decision to buy or not. Only our reviews constitute an endorsement or lack thereof. For more details, you can read our full disclaimer.

Leave a Comment

Your email address will not be published. Required fields are marked *