The discovery of a loophole in my device the Chromecast and the Home of Google is able to pinpoint your location accurately

I didn’t bother to Google what was revealed Jung in the month of last May, but after that eating researcher another security problem, acknowledged it and promised to fix it in a security update scheduled during the month of July next.

Over the past few years, Google has made great strides in the field of hardware, perhaps the among the most common device AirPlay Chromecast speakerphone smart Google Home. Despite the power of those devices, but it is not perfect, after the discovery of some gaps in the past, now announced about the existence of a serious loophole reveal your location accurately.

In the month of May last, discovered the researcher called himself Craig young “loophole” in the authentication within the device to my Google Home and Chromecast. It is called to their select your location carefully through hiring the services of search for the geographical location of Google.

But how is it? Explained Yong way to exploit the loophole, said: “the attacker could be away just as long as it can make the victim open the link while connected to the same Wi-Fi network or a wired network that is connected to a Google Chromecast or Home”.

He added: “the real limitation is only that the link must remain open for a minute before striker may have got on your site. This can contain a link to immigration in the Declaration of a malicious or even a tweet”.

And in the words of Jung understood that the exploitation of this vulnerability requires that the attacker connected to the same network that is connected to the victim. It’s simply not only requires that you click on the link and leave that page open for about a minute to get the location data.

However, it is possible for the attackers to get location data easily by means of less complicated, such as your IP address, this information is not very accurate. What makes this vulnerability even more worrying significantly to information location data you get from Google a minute about incredible.

And Young said that the location data that comes via the IP address can be a minute in the field 3 or 4.5 kilometers, but the exploitation of these vulnerabilities, the resolution does not exceed 10 meters.

Recall that Google did not care what was revealed Jung in the month of last May, but after that eating researcher another security problem, acknowledged it and promised to fix it in a security update scheduled during the month of July next.

And then, advised young using a router separate devices IoT home, so you won’t be able the attacker access to the network for those devices.

Do you have one of two Google Home and Chromecast is? We shared your experience to them in the comments.

Source

The discovery of a loophole in the device to my Chromecast and the Home of Google is able to pinpoint your location accurately was published first in are.

Leave a Reply

Your email address will not be published. Required fields are marked *