• Smartphones
  • Android
  • Apple
  • Gaming
  • Hardware
  • Computing
  • Security
  • Science
  • Social
  • More
    • Wallpapers
    • Next Tech
    • How to
    • Review
    • Video
Tech News, Magazine & Review WordPress Theme 2017
No Result
View All Result
  • Smartphones
  • Android
  • Apple
  • Gaming
  • Hardware
  • Computing
  • Security
  • Science
  • Social
  • More
    • Wallpapers
    • Next Tech
    • How to
    • Review
    • Video
No Result
View All Result
IT Informer
No Result
View All Result
Home Android

The dangers of jailbreaking or rooting devices

by IT Informer
30.12.2017.
in Android, Security
Share on FacebookShare on LinkedinShare on Twitter

Jailbreaking, rooting and unlocking are the processes of gaining unauthorized access or elevated privileges on a system. The terms are different between operating systems, and the differences in terminology reflect the differences in security models used by the operating systems vendors.

Here are just some of the dangers that you’re exposing your device to when rooting/jailbreaking it:

General risks:

  1. Some jailbreaking methods leave SSH enabled with a well-known default password (e.g., alpine) that attackers can use for Command & Control;
  2. The entire file system of a jailbroken device is vulnerable to a malicious user inserting or extracting files. This vulnerability is exploited by many malware programs, including Droid Kung Fu, Droid Dream and Ikee. These attacks may also affect unlocked Windows Phone devices, depending on the achieved unlocking level;
  3. Credentials to sensitive applications, such as banking or corporate applications, can be stolen using keylogging, sniffing or other malicious software and then transmitted via the internet connection.

iOS

  1. Applications on a jailbroken device run as root outside of the iOS sandbox. This can allow applications to access sensitive data contained in other apps or install malicious software negating sandboxing functionality;
  2. Jailbroken devices can allow a user to install and run self-signed applications. Since the apps do not go through the App Store, Apple does not review them. These apps may contain vulnerable or malicious code that can be used to exploit a device.

Android

  1. Android users that change the permissions on their device to grant root access to applications increase security exposure to malicious applications and potential application flaws;
  2. 3rd party Android application markets have been identified as hosting malicious applications with remote administrative (RAT) capabilities.
Sourceblog.kami2017.comhttp://blog.kami2017.com/the-dangers-of-jailbreaking-or-rooting-devices
Tags: AndroidAppleGoogleMicrosoftWindows
Share2ShareTweet2

Related Posts

Google Removes 60 Gaming Apps Infected with Pornographic Malware AdultSwine

Google Removes 60 Gaming Apps Infected with Pornographic Malware AdultSwine

16.01.2018.
Customers Report Credit Card Fraud after Purchasing on OnePlus Webstore

Customers Report Credit Card Fraud after Purchasing on OnePlus Webstore

15.01.2018.
Vishing, is like phishing, except they call you

Vishing, is like phishing, except they call you

15.01.2018.
How to Transfer Contacts from Android to PC

How to Transfer Contacts from Android to PC

15.01.2018.

Trending

Why Microsoft decided to shut down XBOX 360 ?

Why Microsoft decided to shut down XBOX 360 ?

18.11.2017.
metal apple wallpaper

Dark Wallpapers To Compliment Your New iPhone – Best Free HD Wallpapers

25.09.2016.
Microsoft Announces ‘Project Scorpio’ Edition Xbox One X

Steps on how to install Xbox 360 Emulator On PC

11.10.2017.
Final Fantasy 15 Vyv quests land of Eos

Final Fantasy 15 – Red frog and Yellow frog locations (The Professor’s Protege)

01.12.2016.
Make friends on Twitch with new feature friend list

Make friends on Twitch with new feature friend list

15.11.2017.



  • Home
  • Popular
  • Video
  • News
  • Contact

Latest Information Technology News @ itinformer.net

No Result
View All Result
  • Smartphones
  • Android
  • Apple
  • Gaming
  • Hardware
  • Computing
  • Security
  • Science
  • Social
  • More
    • Wallpapers
    • Next Tech
    • How to
    • Review
    • Video

Latest Information Technology News @ itinformer.net