Android users vulnerable to denial of service through a new tool

05th December 2018
Android users vulnerable to  denial of service through a new  tool

Goa, December 5, 2018:  Global provider of leading IT security solutions, K7 Computing  have revealed how the ADB (Android Debug Bridge), a tool used to set or modify Android phone’s authentication PIN or pattern can be leveraged by attackers to lock the user out of his/her own phone without their knowledge.  This is a new Android Denial of Service Vulnerability that is facing users.
Exploitation of this vulnerability via ADB, which had already been disclosed to Google, was demonstrated live, at the  Association of Anti-Virus Asia Researchers International Conference (AVAR) here last,  rendering a smartphone inaccessible by modifying its device security settings.
The conference in association with Indian Computer Emergency Response Team (Cert-In)  attracted 400 participants along with 67 speakers from 25 different international security companies  who addressed and discussed the significant and acute aspects of cybersecurity. The theme of the conference was “The Dynamic Security Ecosystem.”
K7 Computing has been associated with AVAR since its inception and has previously hosted the conference in Chennai, in 2013.
Said  J Kesavardhanan, MD & CEO, K7 Computing, “It is our privilege to be associated with AVAR and to host it again in India. We are very happy with the success of AVAR 2018. With initiations like these, we aim to further our cybersecurity mandate of bringing the industry together to discuss and develop an advanced roadmap to curb cyber threats.”
K7 computing also announced its partnership with PolySwarm, the first decentralized threat intelligence marketplace to further advance its ecosystem of quality malintent detection where K7 Computing will integrate its malware detection engine into PolySwarm’s network.