Information security is the process of protecting the availability and privacy, but you should be aware that not all your applications are safe. Most of all anti-virus programs were forged by hackers. Experts from Trend Micro conducted research and made the conclusion that applications attack Android users more and more.
The company examined the most popular apps in Google Play and found that more than 77% of these applications are fake. Unlicensed programs are almost identical to the original, but at the same time they are very dangerous. According to the research of the Japanese company, called Trend Micro a huge number of fake software were found.
Read moreBoffins get your mobe to spill the beans using Google text-to-speech kit. Researchers from the Chinese University of Hong Kong have developed bizarre malware that dictates contacts, emails and other sensitive text data in order to steal it.
In the novel attack a seemingly innocuous app that required no permissions called a bad guy's phone number and blabbered the stolen data out of the speakers and down the microphone using Google Voice Services (GVS). It affected 'nearly all' Android devices and could not be detected by VoicEmployer malware or victims, provided savvy hackers conducted the attack in the wee hours with the volume turned down.
Read moreAttackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Elasticsearch is an increasingly popular open-source search engine server developed in Java that allows applications to perform full-text search for various types of documents through a REST API (representational state transfer application programming interface). Because it has a distributed architecture that allows for multiple nodes, Elasticsearch is commonly used in cloud environments. It can be deployed on Amazon Elastic Compute Cloud (EC2), Microsoft Azure, Google Compute Engine and other cloud platforms.
Read moreHackers have enrooted harmful programs in computer, which steal personal information from guests.
Secret Service of the USA has found keyloggers in hotels and advised all heads of hotel and restaurant business to check personal computers, which visitors can use. To steal personal and bank information on visitors, malefactors enrooted malware, which remembers pressing of keys on the keyboard. Some people, suspected in compromising computers of many large hotels in Fort Worth and Dallas areas were arrested in Texas. Sometimes the suspects used stolen credit cards to register as guests of the hotels.
Read moreThe Yo app is in the top 10 in the App Store in the USA plus it got 1 million dollars of investments.
The app was noted even by Elon Musk who had called it the best messenger. It appears that the app was hacked by three students from college. Firstly, cracking allows to recognize any phone number of the app user (hackers have already learnt phone number of app founder, and talked to him). Secondly, they can send "Yo" to any user in any quantity. Thirdly, cracking allows sending the push-notice to any user, with any text (guys decided not to do it). Generally, hackers have already reported to the author about the problem and he has confirmed the fact of cracking.
Read moreNokia paid millions of euros to a blackmailer to protect an encryption key of the Symbian phones in 2008.
The National Bureau of Investigation confirms that the case is still unsolved. The matter is investigated as aggravated extortion, says Detective Superintendent Tero Haapala. Journalists said that the blackmailers had acquired the encryption key for a core part of Nokia's Symbian software and threatened to make it public. Had it done so anyone could then have written additional code for Symbian including possible malware which would have been indistinguishable from the legitimate part of the software, MTV said.
Read moreMalefactors can send a harmful code to devices, transmitting packages of data through radio or television channels.
So called smart TV are vulnerable to carrying out drive-by of attacks in which course the exploit is applied to interception of a digital television signal instead of IP-address data. About it in the research report Yossef Oren and Anzhelos Keromitis from Network Security Lab at the Colombian university. "For attack it isn't necessary either the IP address, or the server. Access on a roof to the antenna is needed only, and you can't almost be traced," scientists emphasize.
Read moreDutch group of hackers named doulCi can activate blocked by means of Activation Lock function iPhones, using false iCloud servers.
Team DoulCi published a workaround that requires users to plug a bricked device into their computer and alter the "hosts" file inside. The iPhone or iPad is then tricked into connecting to the hacked server, which unlocks the gadget. Then the device is enough to be connected to iTunes and to dump Activation Lock regularly. DoulCi system works only partially: in attempt to unblock iPhone by their method, GSM module remains disconnected because hackers have no corresponding activation keys, however they promise to correct a problem shortly. The user gets access only to device operating system and Wi-Fi.
Read moreResearchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography.
To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot to the right invoking the FBI, for instance, is the notice that's displayed on infected phones connecting from a US-based IP address. People in Romania and other countries will see slightly different warnings. The malware prevents users from accessing the home screen of their phones, making it impossible to use most other apps installed on the phone.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland