Qualcomm recently confirmed that hackers managed to exploit a zero-day bug - a vulnerability that was unknown to the maker when it was exploited. The breach was found in dozens of chipsets used in millions of Android smartphones across the globe.
The San Diego company also revealed a patch was sent out to OEMs in September and called the attack a "limited, targeted exploitation." the security vulnerability is said to have affected 64 chips made by Qualcomm.
Also Read: Qualcomm Snapdragon 8 Gen 4 QRD Seen In Benchmarks
Which Smartphones Are Affected By The Breach
The affected Qualcomm chips include the Snapdragon 8 Gen 1 SoC, powering smartphones such as Samsung Galaxy S22 Ultra, OnePlus 10 Pro, Sony Xperia 1 IV, Oppo Find X5 Pro, Honor Magic4 Pro, Xiaomi 12, and others. The list also features Snapdragon modems and FastConnect modules, used for Bluetooth and Wi-Fi connectivity.
A spokesperson for Qualcomm said that the company already sent out a patch but it is up to the smartphone makers to release it to their customers. Amnesty International's Security Lab confirmed a Google Threat Analysis Group assessment that the issue was serious.
The research on who is to be blamed and who might have taken advantage of the vulnerability will be "out soon," said an Amnesty spokesperson. Investigation from firms like Google and Amnesty hints the hacking campaign may have targeted specific individuals rather than a large group of users.
Also Read: Qualcomm Snapdragon 4s Gen 2 To Make 5G Phones Dirt Cheap
Indian Govt Warns Microsoft Edge Users Against Critical Risk
The government of India has issued a critical warning to Microsoft Edge users in the country. Users have been urged to update their browsers to the latest version to protect against significant security vulnerabilities.
The Indian Computer Emergency Response Team (CERT-In), a division of the Ministry of Electronics and Information Technology, has found several security issues in versions of Microsoft Edge earlier than 129.0.2792.79. These vulnerabilities could potentially enable remote attackers and cybercriminals to bypass security controls and execute arbitrary code on a user’s device.
As per CERT-In, these security flaws arise from multiple underlying issues, such as insufficient data validation in Mojo, inappropriate implementation in the V8 JavaScript engine, and an integer overflow in the Layout component of the browser.
Exploiting these weaknesses could also let attackers target users by tricking them into visiting malicious websites or opening compromised HTML pages, putting personal data at risk. The government agency has highlighted that these issues if left unpatched, could lead to substantial security breaches. In response, users are strongly encouraged to update their browsers to the newest version, making sure they get the essential security patches provided by Microsoft.