Know more about Security Threats

Know more about Security Threats



1. What is Android USB Debugging?

Android USB Debugging is a tool that developers use to troubleshoot Android apps. But cybercriminals also use it to do bad things, like steal data or install apps on devices without permission.

There are some risks associated with using USB Debugging:

- Criminals can bypass existing security protections on devices.

- They can extract or install apps on devices without permission.

- They can also read and alter data while the app is running.

- Additionally, they can attach to running processes, trace and modify application memory, and perform function or method hooking. Finally, they can establish a remote shell (to run and execute commands remotely) on a device and inject code remotely.


2. What is a Rooted Android Device?


An Android device with root access allows users to go beyond the security restrictions put in place by the Android operating system. This can give users administrator or "superuser" access over the Android OS, which can pose a number of security risks.

These risks include:


- the ability to install untrusted apps,

- vulnerability to malware and hacking,
- granting hackers complete access to your phone.


Additionally, malicious malware apps can steal your sensitive data like login details, passwords, and payment details. Finally, losing root access can also mean losing access to some of the inbuilt security features of the Android OS.



3. What is a Jailbroken iPhone Device?

Jailbreaking an iPhone allows users to get around the security restrictions that are put in place by iOS.

This can leave your phone vulnerable to malware and hackers.

They could steal your sensitive data, like login details and passwords, or even have full access to your phone.

Jailbreaking also disables many of the security features that are built into iOS.


4. What is Screen Mirroring/Screen Casting?


Screen mirroring technology lets one device show the media that is playing on another device.

This can be dangerous because fraudsters can see and access confidential information like CVV numbers, OTP details, and passwords. They can use this information to steal money from user accounts.


5. What is Screen Recording?


Screen recording is when you take a video of what is happening on your device screen. It can be done using the built-in camera or with special applications.

Screen recording can be risky because fraudsters can see and access confidential information like CVV numbers, OTP details, and passwords. They can also misuse this information to steal money from your account.


6. What is Screen Sharing?


Screen sharing is a technology that lets you share what's on your screen with other devices in real time. Sometimes this also includes giving someone else control of your device.

Screen sharing can be risky because:

- Apps you install can be untrustworthy and may steal your personal information, such as login details, passwords and payment information.

- Malicious malware apps can access confidential data like CVV numbers and One-Time Passcodes (OTP) which can then be used to commit fraud.

- Fraudsters can use the shared screen to view and access confidential information like passwords, which they could then misuse to steal money from user accounts.


7. What is Hooking Framework?


Hooking is a technique used by computer programmers to change how an application or operating system behaves.

Attackers use hooking frameworks to intercept function calls, messages, or API calls and then modify the instructions or output. This gives the attacker control over the program's execution path and allows them to redirect it to their own malicious code.

Malicious malware apps can steal your sensitive data like login details, passwords, payment details, etc. They can also monitor and intercept incoming and outgoing data from your mobile device.


8. What is Java Debugger?


The Java Debugger (JDB) is a tool that Java programmers can use to debug their programs. JDB can help find and fix errors in a Java program. However, it can also be used by attackers to cause damage to a system.

Attackers can use JDB to gain access to bank servers through a specific port.


9. What is Malicious Software/Program?


Malicious software is software that is designed to harm a computer, mobile device, network, or server. There are different types of malicious software, including computer viruses, worms, Trojan horses, ransomware and spyware.


There are security risks associated with malware.

For example, malicious malware apps can steal your sensitive data like login details, passwords and payment details.

Fraudsters can misuse confidential information to steal money from user accounts. Attackers can gain access to Bank servers via a specific port if they have malware on their device.