Many of the apps that come pre-installed on a variety of Android devices from manufacturers such as HTC, Samsung, Google and others have access to more services and capabilities on the devices than they should or that users are aware they have, according to new research. These “capability leaks” can sometimes be inherited from other apps, but the researchers say that they constitute significant security weaknesses on the Android devices.
Browsing Category: Social Engineering
The fallout from the controversy surrounding the presence of Carrier IQ’s software on millions of mobile devices on several different platforms has now reached Washington. Sen. Al Franken on Thursday sent a letter to the company, demanding answers to a series of questions about the software and its capabilities, and saying that the data that Carrier IQ collects “may violate federal privacy laws”.
The FBI says that more than 2.5 million systems infected with the DNSChanger malware connected to DNS servers set up by the authorities in the week following a crackdown on a global criminal network dubbed Ghost Click.
Security researcher Trevor Eckhart discovered that many Android devices come pre-loaded with a piece of software made by Carrier IQ. In this video, he demonstrates how the software works and what it’s capable of monitoring. It’s since been revealed that versions of the app may have been on other devices, but likely don’t log users’ actions but provide analytical information for the carriers.
The Federal Trade Commission (FTC) proposed a settlement with social networking giant Facebook on Tuesday, requiring the site to take the privacy of its users more seriously and subject itself to privacy audits every two years for the next 20 years, according to an article in the New York Times.
A report from The Guardian claims that detectives working for Rupert Murdoch’s News International may have siphoned off classified intelligence documents from MI5, Britain’s domestic intelligence agency.
The e-mail addresses and account passwords for more than one thousand United Nations staff and other users of a UN development Web site were leaked online by the hacking group TeamP0ison, which has been linked to past attacks on governments in the U.S. and India.
The security industry has no shortage of hard problems to solve, but the one that’s getting the most attention right now is finding a way to improve, or ideally, replace, the CA infrastructure. The latest in what has become a series of recent proposals to help shore up the certificate authority system comes from a pair of Google security researchers who have laid out a plan for providing auditable public logs of certificates as well as proofs for each certificate that’s issued.
A new worm has popped up on Facebook, using apparently stolen user credentials to log in to victims’ accounts and then send out malicious links to their friends. The worm also downloads and installs a variety of malware on users’ machines, including a variant of the Zeus bot.
Micro blogging site Twitter has acquired Whispersystems, a maker of mobile security software, according to a statement posted on the WhisperSystems Web site.