{"id":561,"date":"2017-05-20T03:22:53","date_gmt":"2017-05-20T03:22:53","guid":{"rendered":"http:\/\/192.168.7.74\/infosystem\/?p=561"},"modified":"2018-12-03T03:24:36","modified_gmt":"2018-12-03T03:24:36","slug":"all-android-phones-vulnerable-to-extremely-dangerous-full-device-takeover-attack","status":"publish","type":"post","link":"https:\/\/infosystem.id\/index.php\/2017\/05\/20\/all-android-phones-vulnerable-to-extremely-dangerous-full-device-takeover-attack\/","title":{"rendered":"All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack"},"content":{"rendered":"<blockquote><p><span style=\"font-size: 12pt;\">Researchers have discovered a new attack, dubbed \u2018Cloak and Dagger\u2019, that works against all versions of Android, up to version 7.1.2. Cloak and Dagger attack allows hackers to silently take full control of your device and steal private data, including keystrokes, chats, device PIN, online account passwords, OTP passcode, and contacts.<\/span><\/p><\/blockquote>\n<p><span style=\"font-size: 12pt;\">Source:\u00a0<em><a href=\"http:\/\/thehackernews.com\/2017\/05\/android-hacking-technique.html\">All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack<\/a><\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have discovered a new attack, dubbed \u2018Cloak and Dagger\u2019, that works against all versions of Android, up to version 7.1.2. Cloak and Dagger attack allows hackers to silently take full control of your device and steal private data, including keystrokes, chats, device PIN, online account passwords, OTP passcode, and contacts. Source:\u00a0All Android Phones Vulnerable&hellip;<\/p>\n","protected":false},"author":1,"featured_media":562,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-561","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/comments?post=561"}],"version-history":[{"count":2,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/561\/revisions"}],"predecessor-version":[{"id":564,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/561\/revisions\/564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/media\/562"}],"wp:attachment":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/media?parent=561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/categories?post=561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/tags?post=561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}