{"id":2400,"date":"2020-08-08T15:11:00","date_gmt":"2020-08-08T13:11:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2400"},"modified":"2020-08-10T15:17:19","modified_gmt":"2020-08-10T13:17:19","slug":"la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/","title":{"rendered":"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID"},"content":{"rendered":"\n<p>Les smartphones Android du monde entier pourraient \u00eatre en danger en raison d&rsquo;une vuln\u00e9rabilit\u00e9 r\u00e9cemment d\u00e9couverte, qui pourrait mettre en danger jusqu&rsquo;\u00e0 40 % de tous les t\u00e9l\u00e9phones fonctionnant avec ce syst\u00e8me d&rsquo;exploitation. Cette faille semble \u00eatre li\u00e9e au chipset Qualcomm Snapdragon, et a \u00e9t\u00e9 signal\u00e9e par les chercheurs en s\u00e9curit\u00e9 de Check Point.<\/p>\n\n\n\n<p>En fait, il a \u00e9t\u00e9 d\u00e9couvert que le chipset pr\u00e9sentait plus de 400 <strong><a href=\"https:\/\/koddos.net\/blog\/fbi-warns-on-the-internet-vulnerabilities-of-smart-tvs\/\">vuln\u00e9rabilit\u00e9s<\/a><\/strong>, ce qui met en danger les smartphones de Google, Samsung, Xiaomi, LG et d&rsquo;autres qui utilisent ce chipset.<\/p>\n\n\n\n<p>Les \u00e9valuations ne sont pas encore assez pr\u00e9cises pour dire avec certitude combien d&rsquo;utilisateurs sont en danger. Certains rapports affirment que plus de 900 millions de t\u00e9l\u00e9phones souffrent de cette faille, tandis que d&rsquo;autres ont relev\u00e9 la barre \u00e0 trois milliards.<\/p>\n\n\n\n<p>Ce que l&rsquo;on sait, c&rsquo;est que les <strong><a href=\"https:\/\/koddos.net\/blog\/another-android-flaw-emerges-making-whatsapp-and-telegram-vulnerable-to-hacker-meddling\/\">failles<\/a><\/strong> ont \u00e9t\u00e9 d\u00e9couvertes dans la puce du processeur de signal num\u00e9rique (DSP) de Qualcomm.<\/p>\n\n\n\n<p><strong>Que fait la puce DSP ?<\/strong><\/p>\n\n\n\n<p>Comme certains le savent peut-\u00eatre, un DSP est en fait un syst\u00e8me sur une puce, et il comporte du mat\u00e9riel et des logiciels qui ont \u00e9t\u00e9 cr\u00e9\u00e9s pour permettre et optimiser les diff\u00e9rents domaines d&rsquo;utilisation d&rsquo;un appareil dans lequel ils sont int\u00e9gr\u00e9s. Cela peut inclure de nombreuses fonctionnalit\u00e9s, de la recharge \u00e0 l&rsquo;exp\u00e9rience multim\u00e9dia, et plus encore.<\/p>\n\n\n\n<p>La puce a \u00e9t\u00e9 test\u00e9e par les chercheurs de Check Point, qui ont d\u00e9couvert que ces failles pouvaient permettre aux hackers d&rsquo;infecter les smartphones avec des logiciels espions &#8211; une branche sp\u00e9ciale de logiciels malveillants qui peut \u00eatre utilis\u00e9e pour <strong><a href=\"https:\/\/koddos.net\/blog\/china-is-spying-on-ethnic-minorities-using-android-malware\/\">espionner les appareils infect\u00e9s<\/a><\/strong>.<\/p>\n\n\n\n<p>Le pire, c&rsquo;est que cela peut se produire sans que l&rsquo;utilisateur ne fasse ou ne sache rien \u00e0 ce sujet. Si les hackers parvenaient \u00e0 infecter un t\u00e9l\u00e9phone, ils pourraient acc\u00e9der \u00e0 la quasi-totalit\u00e9 des donn\u00e9es stock\u00e9es. Il s&rsquo;agirait notamment de photos et de vid\u00e9os, d&rsquo;enregistrements d&rsquo;appels, de GPS et m\u00eame de donn\u00e9es de microphones en temps r\u00e9el.<\/p>\n\n\n\n<p>En outre, les hackers pourraient \u00e9galement utiliser les failles de diff\u00e9rentes mani\u00e8res. Par exemple, ils pourraient faire compl\u00e8tement planter les appareils. Si cela devait se produire, les utilisateurs se retrouveraient dans l&rsquo;incapacit\u00e9 d&rsquo;acc\u00e9der \u00e0 leurs propres informations, tandis que les hackers disposeraient d&rsquo;un acc\u00e8s complet au t\u00e9l\u00e9phone.<\/p>\n\n\n\n<p><strong>Qu&rsquo;a dit Qualcomm ?<\/strong><\/p>\n\n\n\n<p>Les chercheurs de Check Point ont contact\u00e9 Qualcomm apr\u00e8s la d\u00e9couverte des d\u00e9fauts, et l&rsquo;entreprise a reconnu les probl\u00e8mes apr\u00e8s qu&rsquo;ils lui aient \u00e9t\u00e9 pr\u00e9sent\u00e9s. De plus, l&rsquo;entreprise a r\u00e9agi rapidement, en informant les fournisseurs d&rsquo;appareils concern\u00e9s.<\/p>\n\n\n\n<p>Depuis lors, l&rsquo;entreprise s&rsquo;efforce de corriger les d\u00e9fauts et de prendre les mesures d&rsquo;att\u00e9nuation n\u00e9cessaires. Jusqu&rsquo;\u00e0 pr\u00e9sent, rien ne prouve que les vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 exploit\u00e9es, et l&rsquo;entreprise souhaite que cela reste ainsi.<\/p>\n\n\n\n<p>C&rsquo;est \u00e9galement la raison pour laquelle Check Point n&rsquo;a pas r\u00e9v\u00e9l\u00e9 de d\u00e9tails techniques concernant les failles, ni les moyens possibles de les <strong><a href=\"https:\/\/koddos.net\/blog\/chinese-hacking-crew-exploited-linux-servers-for-many-years\/\">exploiter<\/a><\/strong>. Le monde est plein de hackers, qu&rsquo;il s&rsquo;agisse d&rsquo;individus ou de groupes entiers, qui sauteraient imm\u00e9diatement sur l&rsquo;occasion d&rsquo;acc\u00e9der \u00e0 des milliards de smartphones si on leur en donnait la possibilit\u00e9.<\/p>\n\n\n\n<p>Cependant, Check Point a \u00e9galement inform\u00e9 le gouvernement, mais aussi les fournisseurs de t\u00e9l\u00e9phones portables concern\u00e9s. La d\u00e9couverte des failles a conduit \u00e0 une collaboration massive entre toutes ces entit\u00e9s pour tenter de s\u00e9curiser les t\u00e9l\u00e9phones d\u00e8s que possible.<\/p>\n\n\n\n<p><strong>Que se passe-t-il ensuite ?<\/strong><\/p>\n\n\n\n<p>Jusqu&rsquo;\u00e0 pr\u00e9sent, Qualcomm a d\u00e9clar\u00e9 avoir r\u00e9ussi \u00e0 corriger six failles que Check Point a d\u00e9couvertes. En d&rsquo;autres termes, il reste encore beaucoup de travail \u00e0 faire pour s\u00e9curiser correctement tous les appareils vuln\u00e9rables. Cependant, m\u00eame apr\u00e8s que les correctifs aient \u00e9t\u00e9 s\u00e9curis\u00e9s, il reste encore \u00e0 les mettre en \u0153uvre, ce qui sera de la responsabilit\u00e9 des fournisseurs.<\/p>\n\n\n\n<p>En attendant, tous les utilisateurs d&rsquo;Android sont \u00e0 nouveau invit\u00e9s \u00e0 mettre \u00e0 jour leurs appareils d\u00e8s qu&rsquo;un nouveau correctif est disponible. De plus, s&rsquo;ils souhaitent installer de nouvelles applications, ils ne doivent prendre aucun risque et n&rsquo;installer que les applications propos\u00e9es par des boutiques d&rsquo;applications de confiance, telles que Google Play Store.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les smartphones Android du monde entier pourraient \u00eatre en danger en raison d&rsquo;une vuln\u00e9rabilit\u00e9 r\u00e9cemment d\u00e9couverte, qui pourrait mettre en danger jusqu&rsquo;\u00e0 40 % de tous les t\u00e9l\u00e9phones fonctionnant avec ce syst\u00e8me d&rsquo;exploitation. Cette faille semble \u00eatre li\u00e9e au chipset Qualcomm Snapdragon, et a \u00e9t\u00e9 signal\u00e9e par les chercheurs en s\u00e9curit\u00e9 de Check Point. En &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2401,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les smartphones Android du monde entier pourraient \u00eatre en danger en raison d&rsquo;une vuln\u00e9rabilit\u00e9 r\u00e9cemment d\u00e9couverte, qui pourrait mettre en danger jusqu&rsquo;\u00e0 40 % de tous les t\u00e9l\u00e9phones fonctionnant avec ce syst\u00e8me d&rsquo;exploitation. Cette faille semble \u00eatre li\u00e9e au chipset Qualcomm Snapdragon, et a \u00e9t\u00e9 signal\u00e9e par les chercheurs en s\u00e9curit\u00e9 de Check Point. En &hellip; Continue reading LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-08T13:11:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-10T13:17:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID\",\"datePublished\":\"2020-08-08T13:11:00+00:00\",\"dateModified\":\"2020-08-10T13:17:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/\"},\"wordCount\":770,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/\",\"name\":\"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-08-08T13:11:00+00:00\",\"dateModified\":\"2020-08-10T13:17:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/","og_locale":"fr_FR","og_type":"article","og_title":"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID - Blog KoDDoS","og_description":"Les smartphones Android du monde entier pourraient \u00eatre en danger en raison d&rsquo;une vuln\u00e9rabilit\u00e9 r\u00e9cemment d\u00e9couverte, qui pourrait mettre en danger jusqu&rsquo;\u00e0 40 % de tous les t\u00e9l\u00e9phones fonctionnant avec ce syst\u00e8me d&rsquo;exploitation. Cette faille semble \u00eatre li\u00e9e au chipset Qualcomm Snapdragon, et a \u00e9t\u00e9 signal\u00e9e par les chercheurs en s\u00e9curit\u00e9 de Check Point. En &hellip; Continue reading LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID","og_url":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-08-08T13:11:00+00:00","article_modified_time":"2020-08-10T13:17:19+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID","datePublished":"2020-08-08T13:11:00+00:00","dateModified":"2020-08-10T13:17:19+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/"},"wordCount":770,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/","url":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/","name":"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1","datePublished":"2020-08-08T13:11:00+00:00","dateModified":"2020-08-10T13:17:19+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-qualcomm-pourrait-exposer-40-des-telephones-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LA VULN\u00c9RABILIT\u00c9 DE QUALCOMM POURRAIT EXPOSER 40 % DES T\u00c9L\u00c9PHONES ANDROID"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/New-Crypto-Mining-and-Phishing-Malware-Threatens-Android-Devices.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-CI","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2400"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2400\/revisions"}],"predecessor-version":[{"id":2402,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2400\/revisions\/2402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2401"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}