<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Aaj TV English News - Technology</title>
    <link>https://english.aaj.tv/</link>
    <description>Aaj TV English</description>
    <language>en-Us</language>
    <copyright>Copyright 2026</copyright>
    <pubDate>Thu, 23 Apr 2026 15:59:41 +0500</pubDate>
    <lastBuildDate>Thu, 23 Apr 2026 15:59:41 +0500</lastBuildDate>
    <ttl>60</ttl>
    <item xmlns:default="http://purl.org/rss/1.0/modules/content/">
      <title>Combat malware with DVa: Innovative tool safeguards smartphone accessibility services</title>
      <link>https://english.aaj.tv/news/330411320/combat-malware-with-dva-innovative-tool-safeguards-smartphone-accessibility-services</link>
      <description>&lt;p&gt;&lt;strong&gt;Researchers at Georgia Tech have introduced a groundbreaking cloud-based tool named DVa, designed to detect and assist users in removing malware that takes advantage of smartphone accessibility features.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This innovative tool addresses the alarming trend of malicious software misusing accessibility services, which were originally created to aid individuals with disabilities.&lt;/p&gt;
&lt;p&gt;Accessibility features such as screen readers and voice-to-text applications have significantly enhanced smartphone usability for those with visual, auditory, or motor impairments.&lt;/p&gt;
&lt;p&gt;However, these very tools can be exploited by malware to execute unauthorized actions, including tapping buttons, reading sensitive data, or approving transactions without user consent.&lt;/p&gt;
&lt;p&gt;In some instances, malware can obstruct a user’s ability to uninstall it, resulting in persistent infections and potential financial damages, particularly when it gains access to banking applications or cryptocurrency wallets.&lt;/p&gt;
&lt;p&gt;According to Brendan Saltaformaggio, an associate professor in Georgia Tech’s School of Cybersecurity and Privacy, “These attacks can happen silently and quickly.”&lt;/p&gt;
&lt;p&gt;He emphasized the necessity of involving security experts in the development of systems aimed at enhancing accessibility, as failing to do so could leave them vulnerable to cybercriminals.&lt;/p&gt;
&lt;p&gt;DVa conducts a thorough cloud-based scan of a user’s device to identify malicious applications leveraging accessibility permissions. It generates a comprehensive report detailing which apps are infected, instructions for safe removal, targeted legitimate apps, and contact information for the affected companies for further assistance.&lt;/p&gt;
&lt;p&gt;The tool sends a copy of the report to Google to help flag and potentially remove harmful applications from the Play Store.&lt;/p&gt;
&lt;p&gt;Researchers tested the tool by intentionally installing sample malware on five Google Pixel phones, tracking its impact on the system in partnership with Netskope, a cloud and network security company.&lt;/p&gt;
&lt;p&gt;While DVa represents a significant advancement in fighting this specific cybersecurity threat, the team recognizes the delicate balance between ensuring user security and maintaining essential accessibility.&lt;/p&gt;
&lt;p&gt;As Saltaformaggio noted, “It’s not just about removing the malware; it’s about ensuring we don’t undermine accessibility in the process.”&lt;/p&gt;
</description>
      <content:encoded xmlns="http://purl.org/rss/1.0/modules/content/"><![CDATA[<p><strong>Researchers at Georgia Tech have introduced a groundbreaking cloud-based tool named DVa, designed to detect and assist users in removing malware that takes advantage of smartphone accessibility features.</strong></p>
<p>This innovative tool addresses the alarming trend of malicious software misusing accessibility services, which were originally created to aid individuals with disabilities.</p>
<p>Accessibility features such as screen readers and voice-to-text applications have significantly enhanced smartphone usability for those with visual, auditory, or motor impairments.</p>
<p>However, these very tools can be exploited by malware to execute unauthorized actions, including tapping buttons, reading sensitive data, or approving transactions without user consent.</p>
<p>In some instances, malware can obstruct a user’s ability to uninstall it, resulting in persistent infections and potential financial damages, particularly when it gains access to banking applications or cryptocurrency wallets.</p>
<p>According to Brendan Saltaformaggio, an associate professor in Georgia Tech’s School of Cybersecurity and Privacy, “These attacks can happen silently and quickly.”</p>
<p>He emphasized the necessity of involving security experts in the development of systems aimed at enhancing accessibility, as failing to do so could leave them vulnerable to cybercriminals.</p>
<p>DVa conducts a thorough cloud-based scan of a user’s device to identify malicious applications leveraging accessibility permissions. It generates a comprehensive report detailing which apps are infected, instructions for safe removal, targeted legitimate apps, and contact information for the affected companies for further assistance.</p>
<p>The tool sends a copy of the report to Google to help flag and potentially remove harmful applications from the Play Store.</p>
<p>Researchers tested the tool by intentionally installing sample malware on five Google Pixel phones, tracking its impact on the system in partnership with Netskope, a cloud and network security company.</p>
<p>While DVa represents a significant advancement in fighting this specific cybersecurity threat, the team recognizes the delicate balance between ensuring user security and maintaining essential accessibility.</p>
<p>As Saltaformaggio noted, “It’s not just about removing the malware; it’s about ensuring we don’t undermine accessibility in the process.”</p>
]]></content:encoded>
      <category>Technology</category>
      <guid>https://english.aaj.tv/news/330411320</guid>
      <pubDate>Sat, 12 Apr 2025 15:44:37 +0500</pubDate>
      <author>none@none.com (Web Desk)</author>
      <media:content url="https://i.aaj.tv/large/2025/04/12154412389c23f.webp?r=154431" type="image/webp" medium="image" height="720" width="1200">
        <media:thumbnail url="https://i.aaj.tv/thumbnail/2025/04/12154412389c23f.webp?r=154431"/>
        <media:title>Photo via Reuters
</media:title>
      </media:content>
    </item>
  </channel>
</rss>
