Learn languages naturally with fresh, real content!

Popular Topics
Explore By Region
A new Android flaw lets malicious apps steal 2FA codes and messages via GPU timing attacks, affecting most devices despite a partial fix.
A newly discovered Android vulnerability called "Pixnapping," tracked as CVE-2025-48561, allows malicious apps to steal sensitive on-screen data like two-factor authentication codes and private messages using a side-channel attack that exploits GPU timing.
Researchers from UC Berkeley, UC San Diego, the University of Washington, and Carnegie Mellon demonstrated the flaw affects nearly all modern Android devices, including Pixel and Samsung flagship models, and can extract 2FA codes in under 30 seconds.
The attack tricks legitimate apps into displaying content, then reconstructs it via pixel-level timing analysis without user consent.
Google has released a partial fix in the September update, but researchers confirm the exploit can bypass it, with a full patch expected in December.
No evidence of real-world use has been found as of October 14, 2025.
Users are advised to keep devices updated and avoid untrusted apps.
Una nueva falla de Android permite que las aplicaciones maliciosas roben códigos y mensajes 2FA a través de ataques de cronometraje de GPU, afectando a la mayoría de los dispositivos a pesar de una solución parcial.