Looking for vulnerabilities in UC Browser
Introduction At the end of March, we reported that we discovered a hidden ability to download and run unverified code in UC Browser. Today we will analyze in detail how this download occurs and how hackers can use it for their own purposes. Some time ago, UC Browser was advertised and distributed very aggressively: it was installed on users' devices using malware, distributed with […]