Blog Posts Tagged with "Android"
October 03, 2011 Added by:Headlines
"The only reason the data is leaking left and right is because HTC set their snooping environment up this way. It's like leaving your keys under the mat and expecting nobody who finds them to unlock the door..."
September 15, 2011 Added by:Headlines
The new variant is designed to harvest text messages that contain a one-time use code sent to customers by institutions as an added security measure for clients engaged in mobile banking transactions, making SpyEye an even more powerful tool for stealing financial login credentials...
June 14, 2011 Added by:Kelly Colgan
As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it...
June 13, 2011 Added by:Headlines
"It [Plankton] has the ability to remotely access a command-and-control [C&C] server for instructions, and upload additional payloads. It uses a very stealthy method to push any malware it wants to phone... This is pretty serious..."
May 19, 2011 Added by:Headlines
"Today we're starting to roll out a fix which addresses a potential security flaw that could, under certain circumstances, allow a third party access to data available in calendar and contacts. This fix requires no action from users and will roll out globally over the next few days..."
May 16, 2011 Added by:Headlines
"Google has removed the offending apps, published by "zsone," from the official Android Market, but researchers at the security firm Kaspersky Lab said it's possible the malware, classified as a Trojan because it hides inside software, affects more than the 11 apps AegisLab found..."
May 11, 2011 Added by:Headlines
"App store processes of reactively removing applications identified as malicious after they have been installed by thousands of users is insufficient as a means to control malware proliferation. There are specifics steps users must take to mitigate mobile attacks..."
May 03, 2011 Added by:Headlines
The lawsuit alleges privacy violations for the collection of location data, deceptive business practices for failing to notify customers, and violations of the Computer Fraud and Abuse Act for harvesting the data from individual devices...
May 02, 2011 Added by:Robert Siciliano
“Mobile systems lag far behind the established industry standard for open disclosure about problems and regular patch distribution. For example, Google has never made an announcement to its android-security-announce mailing list, although of course they have released many patches.."
April 22, 2011 Added by:Headlines
"After a period of developing and testing we have released a new version of the Skype for Android application onto the Android Market, containing a fix to the vulnerability reported to us. Please update to this version as soon as possible in order to help protect your information..."
April 20, 2011 Added by:Robert Siciliano
Five major players have floated to the top, dominating a major chunk of the mobile operating systems market. It used to be that people chose their phone only by their carrier and what brands they offered. Today many choose their phone based on the manufacturer and its operating system...
April 20, 2011 Added by:Headlines
Statistics show that the targeting of mobile devices by criminal hackers continues to grow more intense. Brad Reed has an excellent article that traces the brief history of smartphone insecurity, listing the top smartphone vulnerability exploits of the last five years...
April 06, 2011 Added by:Wayde York
I was playing with an application to spoof incoming caller ids on my Android-based phone and was attempting to fool my nephew with a crank call. Turns out, when I called his phone with his own number as the spoofed caller id, it went straight into his voice mail controls...
March 28, 2011 Added by:Infosec Island Admin
We are pleased to announce the release of our news and information application on the Android Marketplace. It's now easier than ever to keep up to date with the latest headlines, informative articles from industry experts, security breaches and vulnerability alerts while you are on the move...
March 16, 2011 Added by:Rafal Los
You've got mobile devices now like the iPhone, the 'Droids, the RIM devices, Windows7 handsets and of course WebOS-based devices too. Guess where all the 'apps' and updates come from? Guess what the #1 used transport protocol is on those devices? HTTP...
March 04, 2011 Added by:Headlines
Whenever you download or update an app, you are given a list of permissions for that app. That alarm clock app you are looking at probably shouldn't need to be looking through your contacts. The general rule of thumb is if an app is asking for more than it does, you should probably skip it...
FCC Seeks Public Comment on Mobile Data Coll... taylor white on 07-24-2014
Mobile Security: Tips for Using Personal Dev... taylor white on 07-24-2014
Nortel: From Bankruptcy to Industrial Espion... Eddie colin on 07-23-2014