POSTS TAGGED: security
Posted November 1, 2013 at 06:30 pm by Pulser_G2
Android 4.4 introduces a number of changes intended to reduce the risks of rootkits on the platform. In addition to SELinux, the dm-verity kernel feature is also used on boot. The dm-verity feature is used to verify the filesystem storage, and detect modifications to the device at block level (rather than file level). In essence, dm-verity aims to prevent root software from modifying the device file system. This is done by detecting the modifications made to the filesystem, which will no longer match the expected configuration.
In dm-verity, each block of the storage device has a SHA-256 hash associated with it. (For reference, a block is simply a unit of address for storage, typically around 4 KB on flas. . . READ ON »
Posted October 31, 2013 at 11:30 am by Jimmy McGee
If you’ve ever handed someone your phone to someone, whether to show them a funny picture or if they ask to check it out, you know the terror that runs through your mind thinking of what they could stumble upon: your usernames and passwords for different sites, your special ‘recipe,’ your mistress’s phone number, anything.
Well, XDA Forum Member msappz offers a new way to keep your secret life private. In this video, XDA Developer TV Producer Walter White TK reviews Safe N Secure Notepad. TK shows off the application and gives his thoughts, so check out this app review.. . . READ ON »
Posted October 13, 2013 at 11:30 pm by Will Verduzco
The answer to the question above, as security researcher Philip Marquardt demonstrated, is “yes.” However, it’s not all that likely in practice, and there are several simple ways to protect yourself.
Data security is a rapidly growing concern in our increasingly digital world. In order to help bring these concerns to light, we recently launched a Security forum specifically for discussion of various security-related topics. Not too long ago, we also talked about malware on Android and how this is largely an overstated problem for those running relatively recent builds of the OS. However, when most people think of mobile security, they think of protecting their own device from . . . READ ON »
Posted October 12, 2013 at 01:30 pm by Will Verduzco
A little over a year ago, we took at Anti Spy Mobile, an application by XDA Senior Member pandata000 that was aimed at helping users make sure that their applications’ permissions were in check. The previously mentioned app worked by figuring out which applications are installed, searching for well known spyware, analyzing permissions and Android intents, and giving an easily understandable output to the user listing potential trouble spots. Anti Spy Mobile unfortunately is not able to track the actual connections made by spyware.
In response to user request, pandataooo has now created a new application aimed at showing all of your current connections. Aptly titled Network Connections, pan. . . READ ON »
Posted October 4, 2013 at 11:30 pm by Will Verduzco
We’ve all heard about the Android malware problem. After all, proponents of other mobile operating systems love to spread FUD stating that Android’s malware situation is out of control. Further, there are various entities such as antivirus firms with vested interests in demonstrating that there is indeed an issue.
Who’s to blame the companies using these unscrupulous tactics? After all, it’s simply good business to undermine your mobile OS competitors or create demand for your product in the case of security solution providers. And up until very recently, Google unfortunately lacked a reliable way of determining and tracking the scope of the problem. That changed recentl. . . READ ON »
Posted September 24, 2013 at 04:30 am by Jimmy McGee
We have talked about app development, Ubuntu Touch development, NFC and Firefox OS presentations from XDA:DevCon 2013. All of these presentations are of great value for developers and enthusiasts. However, there is a dark secret in your pocket: exploits. These exploits can be used for good, gaining root or unlocking. However, they can also be used for bad, such as stealing your chickens or texting curse words to your mother, or worse.
This presentation has a simple title, but the content is not simple. “Android Security Vulnerabilities and Exploits” presented by XDA Elite Recognized Developer jcase. Jcase is a mobile security researcher and the developer of many Android exploits. There is great reas. . . READ ON »
Posted August 12, 2013 at 07:00 am by TheRomMistress
Posted July 25, 2013 at 02:30 pm by Jimmy McGee
Whether you want to admit it or not, Android is not always as secure as it could be. But thankfully, good people find the security flaws and report them. Google then patches the vulnerabilities. Then, we hit a roadblock. If you are on a stock ROM, you usually have to wait for your carrier to roll out an update for your device to get the patch. Since rolling out updates doesn’t lead to new phone sales, some carriers don’t offer updates in any reasonable amount of time, or sometimes not at all.
Well don’t leave yourself vulnerable. XDA Recognized Contributor Tungstwenty has a solution, as Portal Administrator Will Verduzco reported earlier. In this video, XDA Developer TV Producer TK reviews Master Key Dual . . . READ ON »
Posted July 19, 2013 at 11:30 am by Jimmy McGee
Android 4.3 leaked for the Google Nexus 4 That and more are covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is an article using your Android device as a Virtual driving game wheel and news about an Xposed Patch for the two recent Master Key-style Android vulnerabilities
Jordan talks about the other videos released this week on XDA Developer TV. XDA Developer TV Producer Kevin released a video talking about Xprivacy to protect your privacy, Elite Recognized Developer AdamOutler should how to do an Unbrickable Mod on the Samsung Captivate, and TK showed us how to root our T-Moble variant of our Samsung Galaxy S 4. Pull up a chair and check out thi. . . READ ON »