scorecardresearch
Government flags security flaws in Android devices running versions 12 to 14

Government flags security flaws in Android devices running versions 12 to 14

CERT-In has flagged severe security issues in Android versions below 12, 12L, 13, and 14, affecting components from various tech giants. Users are urged to update their devices and follow recommended security measures to protect their data.

advertisement
Critical security flaws flagged that might affect Android versions prior to 12, 12L, 13, and 14 (Representative Image) Critical security flaws flagged that might affect Android versions prior to 12, 12L, 13, and 14 (Representative Image)

The Indian Computer Emergency Response Team (CERT-In) has highlighted critical security flaws affecting Android versions prior to 12, 12L, 13, and 14. These vulnerabilities, identified across various components including Framework, System, Google Play updates, Kernel, and components from Arm, MediaTek, Imagination Technologies, and Qualcomm, pose a significant risk to users' data security.

According to CERT-In, if exploited, these flaws could allow hackers to gain elevated privileges on compromised devices, potentially leading to unauthorised access and theft of sensitive information. 

The agency advises users of affected Android versions to take immediate precautions.

ALSO READ | Assam Urban Services App: All-in-One Solution for Urban Dwellers

To safeguard against these flaws, CERT-In recommends several proactive measures:

1. Update Your Device: Ensure your device is running the latest Android version. Regularly check for and install system updates to patch known security issues.

2. Enable Automatic Updates: Turn on automatic updates for both your operating system and applications. This ensures timely delivery of security patches.

3. Use Trusted Sources: Download apps only from reputable sources like the Google Play Store. Avoid third-party app stores or unverified sources that may distribute malicious software.

4. Review App Permissions: Periodically review and manage app permissions. Restrict permissions that seem unnecessary or excessive for an app's functionality.

5. Install Security Software: Consider installing reliable security software that offers real-time protection against malware and phishing attempts.

6. Exercise Caution Online: Avoid clicking on suspicious links or responding to unsolicited messages that may lead to phishing attacks or malware installation.

ALSO READ | WhatsApp may soon block you from chatting if you violate this new policy

7. Back Up Data: Regularly back up important data to an external source or cloud storage. This ensures you can recover your information in case of a security breach or device compromise.

8. Monitor Device Activity: Stay vigilant for any unusual device behaviour such as unexpected pop-ups, slowdowns, or unfamiliar apps, which could indicate a security compromise.

9. Factory Reset If Necessary: If you suspect your device has been compromised, consider performing a factory reset after backing up essential data. This will help eliminate any malicious software.

Edited By: Ashmita
Published On: Jul 11, 2024