z-logo
open-access-imgOpen Access
Media File Jacking Threats and Protections
Author(s) -
Shinto Kurian K,
K. Nirmala
Publication year - 2020
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.d9119.049420
Subject(s) - jacking , android (operating system) , computer science , computer security , mobile device , internet privacy , file system , mobile apps , world wide web , operating system , art , performance art , art history
Media File Jacking (MFJ) is one security threat that affects media file usages within apps. Media files include image files, voice/audio files, video files and document files like pdf, docs, excel sheets, text files, etc. and these files easily find its place within our devices. The primary symptom of a Media File Jacking attack is that it will manipulate the media files, on transferring between users or apps. This type of malwares mainly targets mobile devices. The researchers from Symantec reported that this vulnerability has already found its way into the two top social media messaging apps namely, WhatsApp and Telegram. Not just limited to this, media file jacking can easily target mobile functioning’s whilst managing affected media files and its managed media chat apps. This analysis in detail tries to understand the vulnerabilities that devices are left exposed to via Media file jacking and how can protect Android based mobile devise with the help of existing, upcoming, configurable or programmable features. We try to cover in detail on i.) What Media file jacking attack is? ii.) How this vulnerability is created? iii.) Under which scenario this will happen iv.) What are the different types of attacks? iv.) What are the implications of this attack? v.) what are precautionary measures and how we can mark safe our mobile devices from this attack. This study mainly help to Android media app users and app develops to get a glance about the precautionary measures from media file jacking attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here