Source: Network World by Tim Greene In this article “The exploit relies on attackers creating rogue applications to take advantage of vulnerabilities in the Android build HTC uses on some of its phones, according to a post by the United States Computer Emergency Readiness Team (US-CERT). … So an application could gain access to stored SSIDs of Wi-Fi networks, user names and passwords. If… Read More »
Source: F-Secure In this article “We’ve been seeing cases of malware that first debuted on other operating systems being ported over to Android. Here’s another trojan that fits the bill. Opfake was first found on Symbian and Windows Mobile. In its latest incarnation on Android, the trojan (still) appears to be an Opera Mini app…whose only permission request is to… Read More »
Source: F-Secure F-Secure reports to have come across a site which advertises Android apps. Clicking on this ad will take you to a malicious “Android Market” web site. Downloading any of those apps will cause your phone to be infected with the Trojan:Android/FakeNotify.a. Read more here. Out to go back using the old dial phones!!
Source: Network World By Ms. Smith As seen at a secret conference open only to law enforcement and intelligence agencies, vendors offered cell phone capturing equipment and lessons about location tracking via mobile phones. Does it, however, violate the Fourth Amendment? Do you give up a reasonable expectation of privacy and freedom from being tracked by carrying a cell… Read More »
Register for ISACA’s IT Governance, Risk & Compliance Conference Join us at ISACA’s IT Governance, Risk and Compliance Conference, 19-21 October 2011 in Orlando.You will discover how to enhance the value that IT provides your enterprise, and learn how to ensure IT-related risks are managed and how to assure outcomes including performance and compliance. You will learn from knowledgeable practitioners and benefit… Read More »