Latest Activity: Apr 15
Started by guest_blog Aug 1, 2013.
AMA Trojan exploiting a master key vulnerability in Android has been uncovered infecting smartphones and tablets.Russian security firm Dr. Web found the malicious Android.Nimefas.1.origin Trojan,…Continue
BTW - True story - A guy is sitting in NYC Central Park talking on his cell phone when up runs a criminal and grabs his cell phone. The criminal looks in disgust at the flip phone and says" What a Flip-Phone" and throws it on the ground and then runs away! True story. Even the criminals don't want flip phones. I'll keep mine! 8->
No Android user here - "hell no" - I'm not going to make it easy for them to track me and archive data on me. I got an old flip phone with a battery I can physically remove from the device - I don't need no Android/smart phone.
Millions of Android Devices Vulnerable to 'Heartbleed' Bug
A "master key" that could give cyber-thieves unfettered access to almost any Android phone has been discovered by security research firm BlueBox.
The bug could be exploited to let an attacker do what they want to a phone including stealing data, eavesdropping or using it to send junk messages.
The loophole has been present in every version of the Android operating system released since 2009.
Google said it currently had no comment to make on BlueBox's discovery.
OMG some one joined :)
New Android trojan nearly impossible to remove
IT security firm Kaspersky claims it has discovered the "most sophisticated" Android trojan yet.
Identified by Kaspersky as "Backdoor.AndroidOS.Obad.a", the mobile menace can send SMS to premium-rate numbers, download other malware and install them on the infected device, as well as send malware to other devices via Bluetooth, and remotely perform commands in the console.
Sign Upor Sign In
Or sign in with:
24 or more hours of member activity
Please remember this website is supported by your donations...
12160 NEWS new management/admin info
© 2014 Created by truth.
Report an Issue |
Terms of Service
Please check your browser settings or contact your system administrator.