Qualcomm security holes endanger more than 900 million mobile phones

Qualcomm exhibitor

In recent days they have found four security holes in Qualcomm processors that endanger the security of many smartphones. These holes can be exploited through a harmless app and cause us to lose control of our mobile.

This situation has been called QuadRooter since the number of important security holes is four. The problem lies in the firmware that Qualcomm has released to use its processors, this firmware is the one that creates the problem and the one that makes anyone using Qualcomm processors exposed to security holes.

The problem with Qualcomm processors has its origin in the firmware of its processors

From Qualcomm it is reported that three of the four holes have already been solved and that the latest generation mobiles already have the solution implemented, but nothing has been said about what to do with old or older mobiles that use Qualcomm processors, as well as those mobiles that do not use Android. The situation is serious since it is estimated that this security problem affects more than 900 million devices, among which are such famous brands as LG, Xiaomi, Samsung or HTC, not forgetting the popular Google Nexus.

Qualcomm is the most used brand of mobile processors, but it is not the only one and in any case, while the solution arrives It is recommended to use apps from the Play Store. The use of this store will allow us not to be exposed to these problems since to exploit them it is necessary to install an app that contains malware.

In any doubt that the number of affected users is so high and even if it were so, caution is always the best security methodAlthough certain mobile phones from foreign brands will not have it so easy to save themselves from this problem.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.