FBI Director has been on a media tour lately, making an anti-encryption pitch to the public. Apple's new encryption standards are an unnecessary hurdle to law enforcement — and the FBI needs an easy way to bypass them.
Now Comey is bringing the argument straight to Congress, asking them to update a law to allow backdoors in smartphones. CALEA required telephone providers to make it possible for law enforcement to wiretap phones. Newer forms of communication aren't explicitly mentioned in the law, and Apple's new encryption standards don't leave room for any government access. Even if government officials ask for data, Apple says, the company can't comply.
Read moreA Tic-tac-toe game is actually a new mobile trojan – detected as Trojan-Spy,AndroidOS.Gomal.a, or Gomal – targeting Android devices. Gomal is capable of recording audio from the microphone, stealing incoming SMS messages, stealing device information such as cell phone number.
Obtaining root privileges, dumping memory regions of some processes in order to obtain sensitive data, and stealing data from the device log. Gomal uses many techniques initially incorporated into Windows trojans, the post indicates. Packaging trojans in mobile games is common – there are multiple cases of attackers doing so using the popular games.
Read moreMore than 10 million users of the popular Cyanogen build of Android are exposed to man-in-the-middle attacks thanks to reuse of vulnerable sample code. The zero day vulnerability makes it possible to target any browser used on the popular Android distribution.
A security researcher who works for a top-tier vendor, but asked Vulture South not to use his name, said Cyanogenmod developers among many others had taken Oracle's sample code for Java 1.5 for parsing certificates to obtain hostnames - which is vulnerable to an older bug - and implemented it. Cyanogenmod developers have been contacted about the flaw.
Read moreHackers know how to hack a bank account with the help of MITM. About 23% percent of applications, based on Android by means of which people use banking services were hacked. Everything is a bit better with iOS, there are only 14 percent of apps.
According to the research, hackers use such attack as Man-in-the-Middle in order to steal money. Theft happens during the information transfer from the sender to the recipient. A client will be redirected to fake Wi-Fi knot. Everything will happen very quickly and unexpectedly. To achieve their insidious purposes, hackers set network equipment and create their own Wi-Fi. The difference in wireless network does not matter for you.
Read moreSMS-virus attacks Ukrainian users‘ smartphones. Only devices, based on Android platform are under thread. Many owners of smartphones, Ukrainian mobile operators subscribers became victims of SM-virus. It attacks in such a way that all money is drawn from account, calls are locked, and thus a virus sends messages with the harmful program link to all contacts in the phone book.
Having received the message from known or unknown number, the subscriber follows the link and automatically catches Trojan. After installation, the virus sends information on the victim‘s device, such as IMEI, IMSI, owner‘s number, his location, the version of OS, the model of smartphone etc.
Read moreSecurity researchers from MetaIntell have discovered security vulnerability in the new version of Facebook SDK that put millions of Facebook user's Authentication Tokens at risk.
With help of Facebook SDK for Android and iOS it is easy to integrate mobile apps with Facebook platform. The set of program tools gives creators a chance to simplify process of reading and writing to Facebook APIs and other. “Login as Facebook” function is a secure and personalized way for users to sign, because sharing passwords is not needed.
Read moreBe among the first users of SafeUM! Participate in testing of the innovative secure messenger and become a part of developers professional team.
Make sure you share your comments and reviews in the social networks, using hashtag #SafeUM, as the most active participants will get PREMIUM subscription for a year! We are looking forward to your suggestions, comments and reviews about SafeUM. Become a tester here
Read moreMat Honan in a humorous manner created an everyday life picture in a "smart" house which (according to analysts) each consumer will have in 5-10 years.
I wake up at four to some old-timey dubstep spewing from my pillows. The lights are flashing. My alarm clock is blasting Skrillex or Deadmau5 or something, I don’t know. I never listened to dubstep, and in fact the entire genre is on my banned list. You see, my house has a virus again. Technically it’s malware. But there’s no patch yet, and pretty much everyone’s got it. Homes up and down the block are lit up, even at this early hour. Thankfully this one is fairly benign. It sets off the alarm with music I blacklisted decades ago on Pandora. It takes a picture of me as I get out of the shower every morning and uploads it to Facebook.
Read moreGoogle is planning to launch a new health service called Google Fit to collect and aggregate data from popular fitness trackers and health-related apps at the Google I/O conference.
Such a service would mark a direct challenge to Apple’s HealthKit framework, launched last week and rolling out with its new mobile platform iOS 8 this fall to aggregate data from wearable devices and apps. Last month Samsung also unveiled similar device, called SAMI. Google Fit will aggregate data through open APIs, Google will also announce partnerships with wearable device makers at its I/O conference.
Read moreAfter installation the Android-based device, the malware, called “Banker.AndroidOS.Basti.a” requests permission to access the network, incoming SMS-messages etc.
New Trojan-Banker disguised as a legitimate application WeChat, is used to collect owners financial data of Android-devices from China. According to Kaspersky Lab, the attackers chose this program because many users use it to make payments. Authors the Trojan encrypted it using App Shield, which allows you to add multiple "layers of protection." Nevertheless the IS-company experts manage to decode the file. It is capable of many types of malicious behavior. There are also some packages to make its GUI look more professional, which in turn make it a more potent phishing tool.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland