The Facebook security team is adding some new security features to the social network’s mobile applications, including upgrades to the login mechanism and account recovery options.
Browsing Category: Mobile Security
Google’s Android platform has become the most popular mobile operating system both among consumers and malware writers, and the company earlier this year introduced the Bouncer system to look for malicious apps in the Google Play market. Bouncer, which checks for malicious apps and known malware, is a good first step, but as new work from researchers Jon Oberheide and Charlie Miller shows, it can be bypassed quite easily and in ways that will be difficult for Google to address in the long term.
Combine the rapid adoption of mobile devices with the behavior of some companies developing applications for them, and what do you get? A pocket-sized, portable privacy liability. Veracode explores the consequences of rampant data-mining and the importance of finding the balance between function and privacy in this infographic published today.
Apple has released a detailed security guide for its iOS operating system, an unprecedented move for a company known for not discussing the technical details of its products, let alone the security architecture. The document lays out the system architecture, data protection capabilities and network security features in iOS, most of which had been known before but hadn’t been publicly discussed by Apple.
A group of developers has released a new untethered jailbreak for devices running iOS 5.1.1. The hack allows users to run unsigned apps on their devices, something that Apple doesn’t like so much.
Hacktivists, malware, scams, data theft and DDoS attacks are among the Department of Homeland Security’s concerns regarding this summer’s Olympic Games set to take place in London, according to the DHS Cybersecurity and Communications Integration Center’s Strategic Outlook.
Cybercriminals are using the Tatanga trojan to carry out a complicated man-in-the-browser (MitB) attack that enables the circumvention of SMS authentication for financial transactions, according to Trusteer’s Amit Klein.
Certain Android devices manufactured by the China-based ZTE Corporation contain a poorly protected setuid shell that can be used to gain root-access to vulnerable devices, according to Lookout Mobile Security.
UPDATE–An Android handset produced by Chinese manufacturer ZTE has a backdoor installed that could enable an attacker to take control of an affected device remotely and run arbitrary code. The manufacturer has acknowledged the issue in the ZTE Score M, which includes a harcoded password, and says that it plans to push out a fix soon.
The number of malicious programs that target Google’s Android mobile platform is growing at an alarming rate, according to data from anti-malware company F-Secure.