More Than 3 Bill Smartphones Users Are At Risk

Table of Contents

In this episode of The Cybersecurity Insider podcast, Yigal Behar from 2Secure Corp discusses a serious issue exposed by Checkpoint researchers. 

They found over 400 vulnerabilities in Qualcomm’s Digital Signal Processing (DSP) chip, which could allow hackers to spy on your smartphone without you even knowing!1 

These vulnerabilities can put your privacy at risk, and in this episode, Yigal explains what you need to know to protect yourself.

YouTube video

What Is A DSP?

DSP is a technology used in smartphones to improve several features that make your device work better. It helps with things like speeding up battery charging, improving the quality of videos and photos, and enhancing the sound you hear when playing music or watching videos.

However, these DSP chips can also harbor vulnerabilities. When you watch videos, view images, or interact with other types of content on your phone, the DSP chip processes this data. 

If there are security flaws in the chip, hackers could take advantage of these vulnerabilities and exploit them to access your phone without your knowledge. This puts your privacy and security at risk.

Malicious Apps Can Exploit Vulnerabilities On Your Smartphone

Another way these vulnerabilities can be used is through malicious apps that bypass the usual security settings to gain access to data stored on your phone without your permission.

What’s The Impact?

According to Yigal, these vulnerabilities can have serious consequences, exposing your private information and leaving your device open to malicious attacks. 

Here’s how:

  1. Privacy breach – An attacker can steal sensitive data, including your pictures, videos, call recordings, GPS locations, microphone recordings, and more.
  2. Phone lockout – The attacker could block your access to important data, making your phone unusable, which means you might lose all of your stored information.
  3. Unremovable threat – Once the app or exploit is in place, you might not be able to remove the threat, leaving your phone vulnerable to ongoing attacks.

Act Fast When You’re Notified To Update

Currently, there are no patches or software fixes available to protect against these vulnerabilities. That means, if you receive a notification on your phone to install an update, don’t delay! Installing updates as soon as they’re available is one of the best ways to protect yourself from these threats.

To help reduce your exposure to these risks, Yigal offers five tips:

  1. Don’t install apps from unknown sources: Only download apps from trusted sources like the Google Play Store. Avoid third-party sites that may offer risky or malicious apps.
  2. Avoid browsing unknown websites: Stick to well-known, secure websites. Be cautious of unfamiliar sites that may contain harmful content or malware.
  3. Open emails without downloading the images: Some malicious emails (like phishing) can be designed to exploit vulnerabilities in your phone. To be safe, open emails without automatically downloading images or attachments.
  4. Don’t click on suspicious links: If you receive a link in an email, message, or social media post from an unknown sender, don’t click it. Double-check the sender’s details before following any links.
  5. Backup to the cloud or computer: Regularly back up your important data to a secure cloud service or your computer. This ensures you won’t lose valuable information if your phone is compromised.

For more Cybersecurity news and tips, make sure you don’t miss any podcast episodes of The Cybersecurity Insider. You can also tune in on YouTube, Apple Podcasts, or Spotify

Source:

  1. gmcdouga. (2020, August 6). Achilles: Small chip, big peril. Check Point Blog; Check Point Software. https://blog.checkpoint.com/security/achilles-small-chip-big-peril/
Share this article with a friend

Related Posts

How Cybersecurity Empowers In A Competitive & Globalized Market

How Cybersecurity Empowers In A Competitive & Globalized Market

Today’s fast-paced world finds businesses facing tough competition and operating across borders. To succeed, you need more than great products…
SEC Cyber Incident Rule Reports 71 Filings In 11 Months

SEC Cyber Incident Rule Reports 71 Filings In 11 Months

How often do Cyberattacks happen to big companies? A recent report shows the number of filings the Securities and Exchange…
Snowflake To End Single-Factor Authentication By 2025

Snowflake To End Single-Factor Authentication By 2025

You’ve likely heard of Snowflake, the popular cloud data platform. The company recently announced that it will be phasing out…

Sign Up for Your Free 30-Day SoC Trial Today!

We Are Now Offering Our 24/7 SoC Service With a Risk-Free 30-Day Trial—No Commitments Required.

Hurry! Limited Slots Available for This Exclusive Trial.

Ground Rules

  1. 🏢 Minimum Company Size: Must have at least 25 employees.
  2. 💻 Endpoints Limit: Trial is limited to a specific number of endpoints.
  3. One Trial Per Company: You can’t trial more than once.

What You’ll Get During the Trial

  1. 🎁 $150 Amazon Gift Card: Just for signing up.
  2. 👩‍💻 24/7 SoC Team: Our experts monitoring your environment so you can sleep easy.
  3. 🔍 Threat Hunting: Uncover existing threats hiding in your network.
  4. ⚠️ Active Threat Detection:
    • Detect unknown active threats.
    • Detect known active threats.
  5. 🔧 Missing Patch Identification: Stay on top of vulnerabilities caused by unpatched systems.
  6. Free Internal Vulnerability Assessment:
    At the end of your trial, you’ll receive a complimentary assessment to know exactly where you stand.

Test Drive 2Secure

Create an account to access this functionality.
Discover the advantages