Govt Android 12, Android 13, Android 14 and Android issue high risk warnings for 15 users: what you need to do
The ministry has issued a high severity warning for Android users due to several security weaknesses. It affects Android 12 and later some users. Here what can you do to protect your data.
Listen to the story

The Ministry of Electronics and Information Technology (Matty) has issued a warning for Android users, cited several weaknesses. The Indian Computer Emergency Response Team (Certificate), working with the ministry, reported that Android 12 and later software has been affected. Warning claims that these users may face high-seriousness cyber attacks. The government agency shares that many of these weaknesses on Android are due to flaws in the framework, but, chipset components may also have defects.
It states, “Android has reported several weaknesses, which to obtain sensitive information by an attacker, obtain elevated privileges, execute arbitrary code or deny the terms of service (dos) on the target system (DOS) Can be exploited. ”
This warning is the most serious in safety issues. The agency states that the severity assessment is based on the effect that exploits vulnerability, possibly on an affected device.
Therefore, Cert Android 12, Android 13, Android 14, and Android recommends 15 users to update their equipment to prevent any attack.
How to stop such cyber attack
Keeping your software updated is an important step to protect your equipment from potential weaknesses, but there are additional measures that you can increase to increase safety.
Check for regular updates and enable automatic updates whenever possible, whenever possible, for protection against newly discovered hazards. Avoid clicking suspected links or download the rejected app, as they can serve as entry points for malicious attacks. Always install the app from the official app store to reduce the risk.
Strengthen your safety by using unique, strong passwords for your apple ID and other accounts. Enable two-factor authentication (2fa) for an additional layer of safety. Additionally, to ensure time time, apps permissions and manage the permissions that they only have the necessary access to your data.
Be cautious against fishing efforts that can try to steal your personal information or credentials. If you receive unexpected indications that request sensitive details, always verify the source before providing any information.
By implementing these precautions, you can significantly increase the safety of your device and reduce the risk of falling prey for cyber hazards.