POSTS TAGGED: security
Posted November 22, 2014 at 06:00 pm by Tomek Kondrat
Privacy is always an important topic, as well as a delicate one to cover. Corporations spend millions to provide the best security systems, which are then quite often cracked by hackers or security researchers. You might not be aware that some fake cell towers (a.k.a. IMSI-Catchers, StingRays, GSM Interceptors, Subscriber Trackers) can be used to track and monitor specific groups of users and even remotely manipulate a particular phone. Scary, right? Unfortunately, few parts of the world are free of such unethical practices. There are various conspiracy theories–some credible, others not so much–involving the use of IMSI-Catchers in various contexts such as surveillance/spying and . . . READ ON »
Posted November 20, 2014 at 10:00 pm by jerdog
When Facebook bought WhatsApp for the absurdly large sum of $19bn back in February, they took the tech world by storm. $19bn for a FREE messaging app? A messaging app? Really? Soon afterwards, speculation began to grow about the real reason Facebook, a content marketing company at its core, bought the company and it’s pretty clear: They wanted the wealth of personal information stored about the service subscribers. As it turns out, they weren’t the only ones, as WhatsApp has been the subject of many suspicions of (and attempts at) hackers getting users’ private information.
With the abundance of concerns, Facebook has evidently been listening as they have taken steps to secure your mess. . . READ ON »
Posted September 20, 2014 at 10:00 am by Tomek Kondrat
Android L, once it is eventually released, will feature data encryption turned on by default. This information has been revealed by Niki Christoff, spokeswoman for Google. And in doing so, the Mountain View company is joining Apple in the battle for user privacy and security.
Data encryption is nothing new in Android, as it has been available on certain Android devices since 2011. With the upcoming Android L release, which should happen next month, Google will add procedures to make the encryption automatic. This means that only those users who enter the device password will be able to listen to music, watch videos, or see the pictures on the device when it is connected to a computer or accessed ma. . . READ ON »
Posted September 13, 2014 at 05:00 am by Conan Troutman
Privacy and security are always a concern when it comes to mobile devices, and many of us probably have something or other stored or installed that we’d like to protect and keep from prying eyes or curious children. This can take the form of a certain app or set of applications that you don’t want just anyone to be able to access, or even–dare I say it–some revealing photos that you no longer trust to the cloud. If that sounds at all familiar then fear not, there are a few ways you can help to maintain your security and privacy by restricting access to your device content.
Blackphone Gets Rooted, Qualcomm Security Exploits Affect Moto X, Nexus 5, LG G2, and More! – XDA Developer TV
Posted August 15, 2014 at 07:30 am by Jimmy McGee
The “secure” Blackphone has been rooted! That and much more news is covered by Jordan when he reviews all the important stories from this week. Included in this week’s news is the Qualcomm Security Exploit being demonstrated at Blackhat Conference and the article talking about Code Syntax Highlighting being enabled on the XDA Forums! That’s not all that’s covered in today’s video!
Jordan talks about the other videos released this week on XDA Developer TV. XDA Developer TV Producer TK released an Xposed Tuesday video for YourTube. Then Jordan showed off how to root the Nvidia SHIELD Tablet. And later TK gave us a an Android App Review of HandyCall. Pull up a chair an. . . READ ON »
Posted August 11, 2014 at 06:00 pm by Faiz Malkani
The annual Blackhat conference, now in its 17th year, took place in Las Vegas last week. The conference is an assembly of security-focused individuals at which a number of devices such as home automation systems, smart cars, etc are hacked, in addition to a line up of speakers discussing information security. This year’s event turned out to be rather momentous with the SilentCircle’s Blackphone being rooted by XDA Senior Recognized Developer jcase. Another interesting development was Dan Rosenberg’s discussion, which popped up on the speakers list as ““including a live demonstration of using it to permanently unlock the bootloader of a major Android phone,”.
As it tur. . . READ ON »
Posted August 4, 2014 at 09:00 am by Jimmy McGee
Android 4.4.3 KitKat has been released for the Verizon G Pad 8.3! That and much more news is covered by Jordan when he reviews all the important stories from this weekend. Included in this week’s news is the article talking about getting Navigation on your Samsung Gear 2. Also, be sure the check out the article talking about the Android Fake ID vulnerability! That’s not all that’s covered in today’s video!
Jordan talks about the other video released this weekend on XDA Developer TV, where TK released a video showing you how to root the OnePlus One and the addition of the experimental Linux Kernel 3.10 defconfigs for some SoCs. So pull up a chair and check out this video.. . . READ ON »
Posted August 2, 2014 at 09:00 pm by Tomek Kondrat
While Android is considered a pretty stable and safe operating system, there are some vulnerabilities that pop up from time to time. Some of them are pretty nasty, and force Google to release a minor revision to their OS. But developers here on XDA don’t like to wait, so they often take matters into their own hands before Google officially addresses the problem.
One of the recently discovered bugs is known as the Android Fake ID, and it has been present in Android’s source code since 2010. The bug allows malicious apps to pretend to be signed by trusted providers. This in turn allows them to be loaded as extensions in several contexts such as NFC access, browser plugins, and more. Unfortunately, i. . . READ ON »
Posted July 19, 2014 at 12:00 pm by Tomek Kondrat
Software is never completely secure. If you think otherwise, you are in for a rude awakening. Every now and then, hackers will find a way to take control of an app or expose private data–for money, fun, or fame. Motives varies, but these types of hackers are extremely talented, and often their potential is wasted to illegal activities. One of good guys in finding and neutralizing security flaws is Google. Current efforts have been focused mainly on their own products like Chrome OS or Chrome browser. But now, the whole idea of protecting the Internet has gone to a new level.
The Android Open Source Project is a good example of how the community can be used to make a big project used by million. . . READ ON »