Mobile Security - Infoworld http://www.infoworld.com/t/2112 en Google patches Android icon permissions attack http://www.infoworld.com/d/security/google-patches-android-icon-permissions-attack-240495?source=rss_mobile_security <p>Google has issued a patch for an attack that could lead an Android user to a phishing site, according to security vendor FireEye. FireEye recently spotted an malicious Android application that could modify the icons of other applications so that when they're launched, they send victims to a phishing website.</p> <p>The malware is abusing a set of permissions known as "com.android.launcher.permission.READ_SETTINGS" and "com.android.launcher.permission.WRITE_SETTINGS."</p> Mobile Technology Security Google Android Mobile Security Malware Patch Management Phishing Tue, 15 Apr 2014 11:39:01 +0000 admin 240495 at http://www.infoworld.com Your no-fuss, fail-safe guide to protecting Android devices http://www.infoworld.com/d/mobile-technology/your-no-fuss-fail-safe-guide-protecting-android-devices-237650?source=rss_mobile_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/android_mobile_security.jpg" alt="Your no-fuss, fail-safe guide to protecting Android devices" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Alexander Shirokov</p></em></div> Mobile Technology Security Android Mobile Security Mon, 14 Apr 2014 10:00:00 +0000 Galen Gruman 237650 at http://www.infoworld.com Google amps up fight against malicious apps with enhanced Android security http://www.infoworld.com/d/mobile-technology/google-amps-fight-against-malicious-apps-enhanced-android-security-240283?source=rss_mobile_security <p>Google is boosting Android security safeguards to better detect potentially harmful apps throughout their life cycle.</p> <p>The security enhancement, announced Thursday, is designed to continually check Android devices to detect vulnerabilities in apps that could be introduced at any time. Previously, malicious apps downloaded outside of Google Play could only be flagged at the time of installation.</p> Mobile Technology Security Google Android Application Security Mobile Security Vulnerability Assessment Fri, 11 Apr 2014 11:27:11 +0000 admin 240283 at http://www.infoworld.com Review: 3 encryption tools protect sensitive data -- and more http://www.infoworld.com/d/security/review-3-encryption-tools-protect-sensitive-data-and-more-239520?source=rss_mobile_security <p>Encryption is one of the best ways to prevent the type of terrible headaches that <a href="http://www.networkworld.com/news/2014/020514-target-neiman-marcus-executives-defend-278476.html" target="_blank">many high-profile companies</a> have experienced with stolen data. Even if experienced hackers are able to penetrate a system, having the data encrypted can mean that nothing useful is taken.</p> Mobile Technology Security Encryption Mobile Security IDG Insider Tue, 01 Apr 2014 10:00:00 +0000 uphan 239520 at http://www.infoworld.com Smartphone kill-switch could save consumers $2.6 billion per year http://www.infoworld.com/d/mobile-technology/smartphone-kill-switch-could-save-consumers-26-billion-year-239467?source=rss_mobile_security <p>Technology that remotely makes a stolen smartphone useless could save American consumers up to $2.6 billion per year if it is implemented widely and leads to a reduction in theft of phones, according to a new report.</p> <p>Law enforcement officials and politicians are pressuring cellular carriers to make such technology standard on all phones shipped in the U.S. in response to the increasing number of smartphone thefts. They believe the so-called "kill switch" would reduce the number of thefts if stolen phones were routinely locked so they became useless.</p> Mobile Technology Mobile Security Smartphones Mon, 31 Mar 2014 11:36:59 +0000 admin 239467 at http://www.infoworld.com HP makes printing easier, secure in BYOD environments http://www.infoworld.com/d/computer-hardware/hp-makes-printing-easier-secure-in-byod-environments-238474?source=rss_mobile_security <p>Using mobile devices for one-off printing tasks on office printers may not be a big deal, but Hewlett-Packard is trying to mitigate any security risk through direct wireless printing features it is bringing to enterprise printers.</p> Computer Hardware Hewlett-Packard (HP) Wi-Fi BYOD Printers Mobile Security Mon, 17 Mar 2014 15:15:24 +0000 admin 238474 at http://www.infoworld.com Xamarin works with Samsung to ease Knox development http://www.infoworld.com/d/mobile-technology/xamarin-works-samsung-ease-knox-development-238497?source=rss_mobile_security <p>Xamarin and Samsung Electronics have worked together to make it easier for developers to create apps that can run on Samsung's Knox security platform.</p> <p>Xamarin's platform lets developers use C# to build native applications for iOS, Android, Mac and Windows, and share on average 75 percent of the source code across the different operating systems, according to the company.</p> Application Development Mobile Technology Samsung Android Mobile Apps Mobile Development Mobile Security Mon, 17 Mar 2014 14:59:21 +0000 admin 238497 at http://www.infoworld.com Secusmart puts its BlackBerry encryption chip to work on the desktop http://www.infoworld.com/d/security/secusmart-puts-its-blackberry-encryption-chip-work-the-desktop-238434?source=rss_mobile_security <p>At around €2,000 ($2800) each, the secure smartphones that SecuSmart showed at Cebit last year were out of reach of many businesses -- although three governments have since bought them to secure mobile phone calls between senior officials, according to CEO Hans-Christoph Quelle. Now the company has developed a less expensive and more flexible system intended for the enterprise and has extended the reach of its mobile system to secure VOIP calls on desktop phones.</p> Computer Hardware Mobile Technology Security Authentication Mobile Apps Encryption Processors Mobile Security Fri, 14 Mar 2014 18:30:05 +0000 admin 238434 at http://www.infoworld.com Another security weakness found in iOS 7 http://www.infoworld.com/d/mobile-technology/another-security-weakness-found-in-ios-7-238415?source=rss_mobile_security <p>A researcher has discovered a weakness in iOS 7 that would enable an attacker to bypass a number of mechanisms Apple uses to prevent exploitation of the operating system's kernel.</p> <p>The problem stems from being able to brute force the random number generator, called the Early Random PRNG, to predict its outcomes. The generator is used by a number of important memory protections for iOS devices.</p> Mobile Technology Apple iOS Mobile Security Fri, 14 Mar 2014 14:25:37 +0000 admin 238415 at http://www.infoworld.com Some Samsung Galaxy devices contain a file access backdoor, Replicant developers say http://www.infoworld.com/d/security/some-samsung-galaxy-devices-contain-file-access-backdoor-replicant-developers-say-238332?source=rss_mobile_security <p>The developers of Replicant, a mobile OS based on Android, claim to have found a backdoor vulnerability in a software component shipped with some Samsung Galaxy devices that potentially provides remote access to users' private files through the device modem.</p> <p>The problem is located in the proprietary library that handles communications between the Android OS and the firmware running on the modem chipset, also known as the baseband or radio processor.</p> Mobile Technology Security Android Authentication Mobile Security Vulnerability Assessment Thu, 13 Mar 2014 16:20:32 +0000 admin 238332 at http://www.infoworld.com Class action suit filed against Google over children's in-app purchases http://www.infoworld.com/d/mobile-technology/class-action-suit-filed-against-google-over-childrens-in-app-purchases-238149?source=rss_mobile_security <p>Google is facing a lawsuit over unauthorized in-app purchases on Android devices by children.</p> <p>The class action suit is brought on behalf of all persons in the United States who paid for unauthorized purchases of game currency by their minor children through the Google Play app store. It was filed in the U.S. District Court for the Northern District of California, one of the law firms that filed the suit said Monday.</p> Application Development Mobile Technology Android Mobile Apps Mobile Security Mobile Tools Tue, 11 Mar 2014 11:52:43 +0000 admin 238149 at http://www.infoworld.com Researchers hope to secure development of mobile apps with faster code scans http://www.infoworld.com/d/application-development/researchers-hope-secure-development-of-mobile-apps-faster-code-scans-238094?source=rss_mobile_security <p>Fraunhofer Institute researchers are working to speed up the scanning of mobile app code for security flaws, aiming to offer developers in a few milliseconds the kind of analysis that once required an all-night scan of code.</p> <p>In fact, the researchers are showing not one but three tools to evaluate or enhance the security of mobile apps at the Cebit trade show in Hanover, Germany, this week, the other two intended to detect flaws in already-deployed apps.</p> Application Development Mobile Technology Security Development Tools iOS Mobile Apps Mobile Development Mobile Security Mon, 10 Mar 2014 19:42:43 +0000 admin 238094 at http://www.infoworld.com Android malware detection boosted by university research http://www.infoworld.com/d/security/android-malware-detection-boosted-university-research-237986?source=rss_mobile_security <p>With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices.</p> <p>The tool they have developed, called PREC (Practical Root Exploit Containment), is trained to uncover aberrant code written in the C programming language, the language in which they say most malicious Android code is written.</p> Mobile Technology Security Android Mobile Security Security Fri, 07 Mar 2014 22:21:32 +0000 admin 237986 at http://www.infoworld.com New crimeware tool Dendroid makes it easier to create Android malware http://www.infoworld.com/d/security/new-crimeware-tool-dendroid-makes-it-easier-create-android-malware-237860?source=rss_mobile_security <p>A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.</p> <p>The toolkit is called Dendroid and can be used to create "trojanized" apps -- legitimate applications with malicious code added to them -- that connect back to a command-and-control server over HTTP and allow attackers to perform a variety of malicious actions on devices that have those apps installed.</p> Mobile Technology Security Android Mobile Apps Mobile Security Internet Privacy Malware Thu, 06 Mar 2014 20:28:23 +0000 admin 237860 at http://www.infoworld.com Android-based malware: the good, the bad, and the ugly http://www.infoworld.com/d/mobile-technology/android-based-malware-the-good-the-bad-and-the-ugly-237701?source=rss_mobile_security <p>When it comes to mobile devices, it's well known that malware writers like to target Android. But a threat report published today by security firm F-Secure puts in perspective why Android malware attacks often flop and why Android itself is no pushover.</p> Mobile Technology Security Android Mobile Security Malware Wed, 05 Mar 2014 15:18:16 +0000 admin 237701 at http://www.infoworld.com Pre-installed malware turns up on new Android devices http://www.infoworld.com/d/mobile-technology/pre-installed-malware-turns-new-android-devices-237700?source=rss_mobile_security <p>David Jevans, CTO and founder of Marble Security, recently received some bad feedback from a potential customer testing his company's product, which helps organizations manage and secure their mobile devices.</p> <p>"They basically said 'Your stuff doesn't work'," Jevans said. "It thinks Netflix is malicious."</p> Mobile Technology Security Motorola Mobility Samsung Android Cyber Crime Mobile Security Malware Wed, 05 Mar 2014 12:52:35 +0000 admin 237700 at http://www.infoworld.com Five things you should know about iOS security http://www.infoworld.com/d/security/five-things-you-should-know-about-ios-security-237479?source=rss_mobile_security <p>Security is an extra-hot topic these days, as all sorts of government agencies short on letters but long on budgets keep getting accused of spying on their own citizens, and debates rage on whether what look like <a href="http://www.macworld.com/article/2099987/what-you-need-to-know-about-apples-ssl-bug.html" target="_blank">accidental bugs</a> may actually turn out to be quite intentional.</p> Mobile Technology Security Apple iOS Mobile Security Mon, 03 Mar 2014 12:50:12 +0000 ccraig 237479 at http://www.infoworld.com Amazon.com security slip allowed unlimited password guesses http://www.infoworld.com/d/security/amazoncom-security-slip-allowed-unlimited-password-guesses-237272?source=rss_mobile_security <p>A gaping hole in Amazon.com's mobile application, now fixed, allowed hackers to have an unlimited number of attempts guessing a person's password, according to security vendor FireEye.</p> <p>If users enter their password incorrectly 10 times on the Amazon.com website, the company requires them to solve the squiggle of characters known as a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart). The CAPTCHA is intended to thwart automated programs that will rapidly try different passwords.</p> Mobile Technology Security Amazon.com E-commerce Data Security Mobile Apps Mobile Security Password Security Thu, 27 Feb 2014 12:32:55 +0000 admin 237272 at http://www.infoworld.com Survey reveals generation gap in attitudes about security and privacy http://www.infoworld.com/d/security/survey-reveals-generation-gap-in-attitudes-about-security-and-privacy-237204?source=rss_mobile_security <p>Security and privacy are important concerns for anyone, especially in the wake of revelations about NSA intelligence activities and massive data breaches like the one at Target. A new study from Fortinet, however, indicates that security and privacy behavior <a href="http://www.fortinet.com/press_releases/2014/fortinet-privacy-survey.html" target="_blank">differs significantly by generation</a>.</p> Mobile Technology Security Mobile Security Internet Privacy Password Security Vulnerability Assessment Wed, 26 Feb 2014 15:21:16 +0000 admin 237204 at http://www.infoworld.com Android malware seen using TOR anonymity network http://www.infoworld.com/d/security/android-malware-seen-using-tor-anonymity-network-237187?source=rss_mobile_security <p>Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows.</p> <p>TOR, short for The Onion Router, is software that offers users a greater degree of privacy when browsing the Internet by routing encrypted traffic between a user and a website through a network of worldwide servers. TOR can also be used to host websites on a hidden network.</p> Mobile Technology Security Android Encryption Mobile Security Malware Wed, 26 Feb 2014 12:54:58 +0000 admin 237187 at http://www.infoworld.com