{"id":129783,"date":"2019-02-13T21:18:31","date_gmt":"2019-02-13T21:18:31","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=129783"},"modified":"2025-07-01T22:22:33","modified_gmt":"2025-07-02T05:22:33","slug":"android-security-png-threat","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/android-security-png-threat\/","title":{"rendered":"Android security alert: Google highlights new vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-129940\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-1024x576.jpg\" alt=\"Android security risk\" width=\"700\" height=\"394\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-1024x576.jpg 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-300x169.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-768x433.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-800x450.jpg 800w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-664x374.jpg 664w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-238x134.jpg 238w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-436x246.jpg 436w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-370x208.jpg 370w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-304x170.jpg 304w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down-1200x675.jpg 1200w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-upside-down.jpg 1280w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>It is no secret that being online all the time brings with it certain security risks and vulnerabilities. We\u2019re vulnerable whether we\u2019re using our desktop PC, Mac, or mobile. As if to demonstrate the constant security risks, we face across all of our devices, Google has highlighted a new vulnerability it has found on Android smartphones.<\/p>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/08\/malware192192.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">5 tips to prevent security issues with your phone<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/5-tips-to-prevent-security-issues-with-your-phone\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Boost your security now<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/5-tips-to-prevent-security-issues-with-your-phone\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h2>Android security vulnerability leaves phones open to attack via malicious PNG files<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-129938\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-Security-Bulletin-300x40.jpg\" alt=\"New Android vulnerability\" width=\"700\" height=\"94\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-Security-Bulletin-300x40.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-Security-Bulletin-768x103.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/02\/Android-Security-Bulletin.jpg 794w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>In a <a href=\"https:\/\/source.android.com\/security\/bulletin\/2019-02-01.html\" target=\"_blank\" rel=\"noopener noreferrer\">security bulletin<\/a> published last week, Google released details of an Android bug that was leaving users vulnerable to attack. According to the bulletin, the bug \u201ccould allow a remote attacker using a specially crafted PNG file to execute arbitrary code within the context of a privileged process.\u201d This means that a seemingly harmless PNG image file could leave your Android device wide open to hackers.<\/p>\n<p>The good news in all of this is that Google reported the bug to Android over a month ago and the problem has since been fixed. If your phone has recently received an update, then it will have received the patch that deals with this issue. Unfortunately, with Android being such a fragmented OS, with many smartphone manufacturers running it across billions of devices there will still be a lot of people yet to receive the update. Fortunately, Google has also reported that no users have reported falling victim to the bug so far.<\/p>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-logo-l,f_auto,dpr_auto\/p\/e2516e3c-b9e9-4ec3-9d8b-01458cb792a7\/772975458\/datally-datally%20icon.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">This app will give you greater control over you mobile data<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/google-datally-wi-fi-map\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Check it out<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/google-datally-wi-fi-map\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<p>The bad news is that there will still be users who are vulnerable to attack via this weakness and details are thin on the ground about what the attack might look like. With Google only talking about the theoretical possibilities in their security bulletin, information on what the \u201cspecially crafted PNG file\u201d could look like is non-existent. If you use an Android phone and it hasn\u2019t been updated recently, you need to be extra careful when opening or downloading PNG files. Always make sure the source of the file is reputable and can be trusted before clicking on or downloading the PNG file in question.<\/p>\n<figure id=\"attachment_116976\" aria-describedby=\"caption-attachment-116976\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-116976\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-300x169.jpg\" alt=\"Is Android being replaced\" width=\"700\" height=\"394\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-300x169.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-768x433.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-1024x576.jpg 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-800x450.jpg 800w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-664x374.jpg 664w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-238x134.jpg 238w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-436x246.jpg 436w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-370x208.jpg 370w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-304x170.jpg 304w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android-1200x675.jpg 1200w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2019\/01\/Fuschia-v-Android.jpg 1280w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-116976\" class=\"wp-caption-text\">Fuchsia could mean the end for Android<\/figcaption><\/figure>\n<p>This news of a new security vulnerability found in Android comes on the back of a lot of new evidence showing that Google may be about to turn its back on the Android brand in favor of something more modern and multi-platform compatible. <a href=\"https:\/\/en.softonic.com\/articles\/is-google-about-to-kill-android\/\">Google has quietly been removing the word Android from a number of its key products<\/a> and there is <a href=\"https:\/\/en.softonic.com\/articles\/the-end-of-android-more-big-news-about-googles-new-operating-system\/\">a lot of talk going around about Google Fuchsia<\/a>, a new OS that will work on all devices from smartphones and laptop like Chromebooks to wearable devices like smartwatches. Whereas there is nothing linking this latest story to the ongoing development of a new smartphone OS, it <em>is<\/em> telling that Google is a little more willing to discuss potential problems that Android may be facing.<\/p>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/09\/batteries11-1024x576.jpg\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">How to save battery on your Android<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/how-to-save-battery-on-your-android\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Read now<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/how-to-save-battery-on-your-android\/\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Android security vulnerability leaves phones open to attack via malicious PNG files<\/p>\n","protected":false},"author":9073,"featured_media":129940,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[1082,1068,1027],"usertag":[839],"vertical":[],"content-category":[],"class_list":["post-129783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-android","tag-google","tag-security","usertag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/129783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9073"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=129783"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/129783\/revisions"}],"predecessor-version":[{"id":326590,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/129783\/revisions\/326590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/129940"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=129783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=129783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=129783"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=129783"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=129783"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=129783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}