Govt warns Android users of a serious risk. This is what you should do!

Android versions prior to 12, v12L, v13, and v14 have a high risk vulnerability that has been identified by the Indian Computer Emergency Response Team (CERT-In). Because of this, the organization has alerted consumers to a high severity risk that poses a security risk. 

According to CERT-in, hackers may be able to gain elevated privileges and obtain sensitive information on the targeted system if they successfully exploit the vulnerability. This implies that a hacker may gain control of impacted users’ devices and use them to access and steal confidential data from a victim’s device. 

According to the cybersecurity organization, flaws in the Framework, System, Google Play system updates, Kernel, Arm components, MediaTek components, Imagination Technologies, Qualcomm components, and Qualcomm close-source components are the causes of these vulnerabilities in Android. 

This essentially implies that if you are a user and your smartphone is running an Android version lower than Android 12, Android 12L, Android 13, or Android 14, then a number of factors, such as problems with the Framework, System, Google Play updates, and Kernel, have combined to create this bug. According to CERT-In, there has also been a lag in the Arm, MediaTek, Imagination Technologies, and Qualcomm components, which has contributed to the security risk.

Which Precautionary Steps can be taken by Users?

There are various precautionary steps that users can take to guard against these high-risk vulnerabilities. Here are a few of them: 

  • Making sure your device is running the most recent version of Android is the first and most important step. Keep an eye out for system updates and apply them as soon as possible. Security patches for known vulnerabilities are regularly included in these releases.
  • Turn on automatic updates for your software and operating system. This lowers the chance of vulnerability exposure by guaranteeing that you get the most recent security fixes and updates as soon as they become available.
  • Download software only from reputable stores such as the Google Play Store. Installing apps from unidentified or third-party sources is discouraged since they can include malicious malware meant to take advantage of security holes. 
  • Make sure your apps have the rights they need on a regular basis. Apps demanding unnecessary permissions or access to private information should be avoided. Remove any permissions that don’t seem necessary or appropriate for the use of the app.
  • You should consider setting up a reliable security program on your computer. These applications can add another degree of security by identifying and thwarting harmful activity.
  • Be wary of unsolicited emails, links, or messages in general, especially if they request personal information or login credentials. Hackers often use phishing attacks to take advantage of weaknesses.
  • Make sure you frequently backup your data to the cloud or an external source. Having a backup guarantees that, in the unlikely event that your device is compromised, you can restore your data with little to no loss.
  • Pay attention to any odd behavior on your smartphone, such as abrupt lags, unexpected pop-ups, or strange programs. These might indicate a security breach.
  • You can go for the factory reset option if you think your device has been compromised. Make sure to back up any crucial data before doing this as it will remove all data from your device, including any malicious files. 


By Shahrukh Ansari

Shahrukh has a keen understanding of SEO principles and extensive experience when it comes to writing for various industries and niches.

Leave a Reply

Your email address will not be published. Required fields are marked *