November 8, 2013 in News, Security by admin
Google has started to encrypt its traffic between its data centers, effectively halting the broad surveillance of its inner workings by the joint National Security Agency-GCHQ program known as MUSCULAR. The move turns off a giant source of information to the two agencies, which at one point accounted for nearly a third of the NSA’s daily data intake for its primary intelligence analysis database—at least for now.
Yesterday, the Washington Post shared additional slides produced by the NSA on the MUSCULAR program, which tapped into the fiber-optic networks carrying traffic to and from Google’s and Yahoo’s overseas data centers. The slides indicated that data from the networks frequently reached the daily intelligence briefing provided to President Barack Obama. They cited the joint operation with GHCQ as the fifteenth-largest source of intelligence data for those briefings.
The slides also revealed that the NSA obtained an intimate understanding of the internal operations of these networks, which suggests it either launched a significant reverse-engineering operation to pry apart Google’s and Yahoo’s secrets or it obtained this information from people who worked for the two companies (maybe even some combination of the two). Either way, the effort amounts to a major intelligence operation to discover the trade secrets of two major American companies.
For the original article, follow this link.
July 25, 2013 in Android, News, Security by admin
“Norton Mobile Insight—our system for harvesting and automatically analyzing Android applications from hundreds of marketplaces—has discovered the first examples of the exploit being used in the wild. Symantec detects these applications as Android.Skullkey.”
We found two applications infected by a malicious actor. They are legitimate applications distributed on Android marketplaces in China to help find and make doctor appointments.
An attacker has taken both of these applications and added code to allow them to remotely control devices, steal sensitive data such as IMEI and phone numbers, send premium SMS messages, and disable a few Chinese mobile security software applications by using root commands, if available.
Update [July 24, 2013] – We have discovered four additional Android applications infected by the same attacker and being distributed on third-party app sites. The apps are a popular news app, an arcade game, a card game, and a betting and lottery app. All of these apps are designed for Chinese language users.
We have also determined Android.Skullkey will send a text message to all your contacts with a link to a mobile game at hldc.com. This site is currently down.
For the entire article please follow this link.
July 12, 2013 in Android, Linux, News, ROM by admin
Given all the Android security topics in the news, we thought it prudent to issue a follow-up to the 10.1.0 general release, incorporating patches for various vulnerabilities that have since been identified.
t the time of this post, CyanogenMod 10.1.1 releases are building and mirroring to our download portal. The CM 10.1.1 build is purely a security bug-fix release on top of the previous 10.1.0.x code-base. While it does not carry any new features, it does address the following:
- Bug 8219321 aka “MasterKey” exploit (also patched in CM 7 and CM 9 source)
- CVE-2013-2094 (Linux kernel exploit)
- CVE-2013-2596 (Qualcomm-specific exploit)
- CVE-2013-2597 (Qualcomm-specific exploit)
- General device bug-fixes
With the security nature of this release, all users on CM 10.1.0.x are encouraged to update once their respective build is available