Blog Posts Tagged with "Android"

00fd6160b9db2d91e663a578d87cbaf3

How Secure is Your Voice Mail?

April 06, 2011 Added by:Wayde York

I was playing with an application to spoof incoming caller ids on my Android-based phone and was attempting to fool my nephew with a crank call. Turns out, when I called his phone with his own number as the spoofed caller id, it went straight into his voice mail controls...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Application Now Available For Android

March 28, 2011 Added by:Infosec Island Admin

We are pleased to announce the release of our news and information application on the Android Marketplace. It's now easier than ever to keep up to date with the latest headlines, informative articles from industry experts, security breaches and vulnerability alerts while you are on the move...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cross-Site Scripting in the Wild Exploiting Your Droid

March 16, 2011 Added by:Rafal Los

You've got mobile devices now like the iPhone, the 'Droids, the RIM devices, Windows7 handsets and of course WebOS-based devices too. Guess where all the 'apps' and updates come from? Guess what the #1 used transport protocol is on those devices? HTTP...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Tips to Keep Your Android Phone Secure

March 04, 2011 Added by:Headlines

Whenever you download or update an app, you are given a list of permissions for that app. That alarm clock app you are looking at probably shouldn't need to be looking through your contacts. The general rule of thumb is if an app is asking for more than it does, you should probably skip it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Six Hot New Hacks from Black Hat DC 2011

January 25, 2011 Added by:Headlines

Michael Gregg has assembled his picks for the top six hacks revealed at the Black Hat DC 2011 conference. Dozens of innovative threats were revealed at the conference last week, but Gregg describes these particular exploits as being the "six new hacks that will make your CSO cringe"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Soundminer Trojan Listens for Credit Card Numbers

January 23, 2011 Added by:Headlines

"We implemented Soundminer on an Android phone and evaluated our technique using realistic phone conversation data. Our study shows that an individual's credit card number can be reliably identified and stealthily disclosed. Therefore, the threat of such an attack is real..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Hack Makes Smartphones Mobile Spy Bugs

January 20, 2011 Added by:Headlines

Ralf-Philipp Weinmann of the University of Luxembourg has identified an over-the-air attack that targets the GSM/3GPP stack enabling hackers to execute malicious code that can turn a smartphone into a mobile listening device...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Android Trojan Most Sophisticated Ever Found

January 03, 2011 Added by:Dan Dieterle

Geinimi is capable of receiving commands from remote servers controlled by hackers, this botnet-style functionality together with the use of code obfuscation techniques leads mobile security firm Lookout to describe the malware as the most sophisticated to appear on Android devices to date...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »