Twitter users will be alerted to a change in the type of data the social network is collecting on them, and will be offered the option to opt-out by adjusting their settings. The data in question is a list of the apps you have installed on your mobile device.
The company says it’s using the app data to help “build a more tailored experience for you on Twitter,” which includes things like improving your “who to follow” recommendations by connecting you with those who have similar interests; showing your relevant promoted content; and adding content to your timeline like tweets and accounts that Twitter thinks you’ll find interesting.
Read moreApple Inc was ordered to face a federal lawsuit of the USA claiming it failed to tell consumers that its messaging system would block them from receiving text messages if they switched to Android-based smartphones from iPhones.
Apple must face plaintiff's claim that the message blocking interfered with her contract with Verizon Wireless for wireless service, which she kept after switching in April to a Samsung Galaxy S5 from an iPhone 4. Plaintiff, who seeks class-action status and unspecified damages, claimed that Apple failed to disclose how its iOS 5 software operating system would obstruct the delivery of messages from other Apple device users if iPhone users switched to non-Apple devices.
Read moreAndroid is well known for its seemingly never-ending customization options and its permissive rooting credentials among other things. Distributions that cannot be modified to enable elevated permissions are quite rare, as enthusiasts seek to have virtually every possible feature available at their disposal.
But should you pursue that path? Does root provide what you need, or what you think you need? There are a couple of good reasons why you probably should root Android, but root is not for everyone, as the risks can far outweigh the benefits and you are likely to regret your decision once things get messy. So here is why you should not do it.
Read moreA new strain of Android ransomware is threatening the mobile industry, the new variant spreads itself via SMSs and holds the victim’s device phone hostage until a ransom is paid.
Implementing a classic extortion scheme locks the victim’s device display and then requests money from victims. The malware displays fake notifications from law enforcement agencies that accuse victims of viewing and storing child pornography. The security firm has already observed thousands of messages from hundreds of infected phones, mainly located in the USA. The attack scenario is very interesting, to spread itself, it first sends an SMS message to all contacts in the mobile’s address book with a text.
Read moreFBI Director has been on a media tour lately, making an anti-encryption pitch to the public. Apple's new encryption standards are an unnecessary hurdle to law enforcement — and the FBI needs an easy way to bypass them.
Now Comey is bringing the argument straight to Congress, asking them to update a law to allow backdoors in smartphones. CALEA required telephone providers to make it possible for law enforcement to wiretap phones. Newer forms of communication aren't explicitly mentioned in the law, and Apple's new encryption standards don't leave room for any government access. Even if government officials ask for data, Apple says, the company can't comply.
Read moreTwo researchers have demonstrated how to hide a malicious Android APK in images. Mobile devices are continuously under attacks, cyber criminals are improving their technique to attack mobile users and increase the profits.
A new technique recently disclosed, allows attackers to hide encrypted malicious Android applications inside images, the method allows threat actors to evade detection by antivirus products and potentially also the checks run by Google Play. During the presentation the Android device displayed a permission request when the wrapper application tried to install the decrypted file.
Read moreA Tic-tac-toe game is actually a new mobile trojan – detected as Trojan-Spy,AndroidOS.Gomal.a, or Gomal – targeting Android devices. Gomal is capable of recording audio from the microphone, stealing incoming SMS messages, stealing device information such as cell phone number.
Obtaining root privileges, dumping memory regions of some processes in order to obtain sensitive data, and stealing data from the device log. Gomal uses many techniques initially incorporated into Windows trojans, the post indicates. Packaging trojans in mobile games is common – there are multiple cases of attackers doing so using the popular games.
Read moreMore than 10 million users of the popular Cyanogen build of Android are exposed to man-in-the-middle attacks thanks to reuse of vulnerable sample code. The zero day vulnerability makes it possible to target any browser used on the popular Android distribution.
A security researcher who works for a top-tier vendor, but asked Vulture South not to use his name, said Cyanogenmod developers among many others had taken Oracle's sample code for Java 1.5 for parsing certificates to obtain hostnames - which is vulnerable to an older bug - and implemented it. Cyanogenmod developers have been contacted about the flaw.
Read moreAttackers intercept cookie, then they can control browsing of the victim. A Metasploit module, with which it is possible to exploit vulnerability in three quarters of smartphones, based on Android, appeared in the popular set of tools for penetration testing.
With its help it is possible to intercept the web-pages that are viewed by the user. Web-pages that the user looks through can be intercepted with the help of this vulnerability. The vulnerability affects Android 4.4 (and earlier versions). It was disclosed this year on the 1st of September by Tod Beardsley, an independent researcher, who called the flaw "privacy disaster".
Read moreHackers know how to hack a bank account with the help of MITM. About 23% percent of applications, based on Android by means of which people use banking services were hacked. Everything is a bit better with iOS, there are only 14 percent of apps.
According to the research, hackers use such attack as Man-in-the-Middle in order to steal money. Theft happens during the information transfer from the sender to the recipient. A client will be redirected to fake Wi-Fi knot. Everything will happen very quickly and unexpectedly. To achieve their insidious purposes, hackers set network equipment and create their own Wi-Fi. The difference in wireless network does not matter for you.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland