Blog Posts Tagged with "Android"

69dafe8b58066478aea48f3d0f384820

HTC Android Devices are Leaking Sensitive User Data

October 03, 2011 Added by:Headlines

"The only reason the data is leaking left and right is because HTC set their snooping environment up this way. It's like leaving your keys under the mat and expecting nobody who finds them to unlock the door..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New SpyEye Variant Targeting Android Devices

September 15, 2011 Added by:Headlines

The new variant is designed to harvest text messages that contain a one-time use code sent to customers by institutions as an added security measure for clients engaged in mobile banking transactions, making SpyEye an even more powerful tool for stealing financial login credentials...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Worse Than Zombies: The Mobile Botnets Are Coming

June 14, 2011 Added by:Kelly Colgan

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Zaps More Infected Android Applications

June 13, 2011 Added by:Headlines

"It [Plankton] has the ability to remotely access a command-and-control [C&C] server for instructions, and upload additional payloads. It uses a very stealthy method to push any malware it wants to phone... This is pretty serious..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Android Privacy Flaw Exposes 99.7% of Users

May 19, 2011 Added by:Headlines

"Today we're starting to roll out a fix which addresses a potential security flaw that could, under certain circumstances, allow a third party access to data available in calendar and contacts. This fix requires no action from users and will roll out globally over the next few days..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

SMS Trojan Infects Multiple Android Applications

May 16, 2011 Added by:Headlines

"Google has removed the offending apps, published by "zsone," from the official Android Market, but researchers at the security firm Kaspersky Lab said it's possible the malware, classified as a Trojan because it hides inside software, affects more than the 11 apps AegisLab found..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Android Malware Increased 400% Over Six Months

May 11, 2011 Added by:Headlines

"App store processes of reactively removing applications identified as malicious after they have been installed by thousands of users is insufficient as a means to control malware proliferation. There are specifics steps users must take to mitigate mobile attacks..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Sued for Surreptitious Android Location Tracking

May 03, 2011 Added by:Headlines

The lawsuit alleges privacy violations for the collection of location data, deceptive business practices for failing to notify customers, and violations of the Computer Fraud and Abuse Act for harvesting the data from individual devices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Should You Worry About Smartphone Security?

May 02, 2011 Added by:Robert Siciliano

“Mobile systems lag far behind the established industry standard for open disclosure about problems and regular patch distribution. For example, Google has never made an announcement to its android-security-announce mailing list, although of course they have released many patches.."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Skype Fixes Critical Android Application Vulnerability

April 22, 2011 Added by:Headlines

"After a period of developing and testing we have released a new version of the Skype for Android application onto the Android Market, containing a fix to the vulnerability reported to us. Please update to this version as soon as possible in order to help protect your information..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Top Five Mobile Operating System Options

April 20, 2011 Added by:Robert Siciliano

Five major players have floated to the top, dominating a major chunk of the mobile operating systems market. It used to be that people chose their phone only by their carrier and what brands they offered. Today many choose their phone based on the manufacturer and its operating system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

A Brief History of Smartphone Insecurity

April 20, 2011 Added by:Headlines

Statistics show that the targeting of mobile devices by criminal hackers continues to grow more intense. Brad Reed has an excellent article that traces the brief history of smartphone insecurity, listing the top smartphone vulnerability exploits of the last five years...

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

How Secure is Your Voice Mail?

April 06, 2011 Added by:Wayde York

I was playing with an application to spoof incoming caller ids on my Android-based phone and was attempting to fool my nephew with a crank call. Turns out, when I called his phone with his own number as the spoofed caller id, it went straight into his voice mail controls...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Application Now Available For Android

March 28, 2011 Added by:Infosec Island Admin

We are pleased to announce the release of our news and information application on the Android Marketplace. It's now easier than ever to keep up to date with the latest headlines, informative articles from industry experts, security breaches and vulnerability alerts while you are on the move...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cross-Site Scripting in the Wild Exploiting Your Droid

March 16, 2011 Added by:Rafal Los

You've got mobile devices now like the iPhone, the 'Droids, the RIM devices, Windows7 handsets and of course WebOS-based devices too. Guess where all the 'apps' and updates come from? Guess what the #1 used transport protocol is on those devices? HTTP...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Tips to Keep Your Android Phone Secure

March 04, 2011 Added by:Headlines

Whenever you download or update an app, you are given a list of permissions for that app. That alarm clock app you are looking at probably shouldn't need to be looking through your contacts. The general rule of thumb is if an app is asking for more than it does, you should probably skip it...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »