Pages

Showing posts with label Mobiles. Show all posts
Showing posts with label Mobiles. Show all posts

Saturday, January 7, 2012

Malware threatens Android phones - Part ||


In Malware threatens Android phones - Part | post we read how malware threats are increasing on Android platform. here in second part of Malware threats to Android phones" we will see some more applications which are more dangerous.

We read in earlier post how Android phones are now drawing crooks attention. It is easier to launch malware on Android. In most cases, the phones are being compromised by installation of certain applications that exploit the vulnerabilities Many of my friends who use iPhone said "Apple's  iPhone too has an app store but the applications that are available on the store are put through a stringent evaluation and it is a closed Eco-
system". In the case of Android , the eco- system is open and there are multiple app stores. That is precisely why the incidence of malware is high on Android phones.  "A map application with malware is more dangerous. It provides the exact location of the phone-user and it is great threat to the phone-user as a
person". Similarly, there are malware in the guise of application that track other forms of data, including mobile banking and the contact list.
android-malware-malicious-2.2-tablet-market-apps-phones

A key difference between the early days of cybercrime targetting PC's and the current drift towards mobile platform is that cybercriminals are starting from scratch, There are circles within circles.For instance."SMS Privato Spy" is marketed as a app that allow buyers(read scammers) to spy on a smartphone user by doing such things as viewing the phone screen live, viewing call logs, performing GPS tracking and activating the phone's microphone to listen in on conversations. The only problem - besides such an app being an obvious invasion of privacy  - is that SMS Privato Spy doesnt exist! Those behind the scam go to great  lengths to convince potential buyers that it does exist. But all that the buyers get for their money is a lighter wallet.But there are malware that do exist. Even when bad apps are discovered, it does not solve the problem. 

Such malware is hard to uninstall. Instead of infecting  devices at one go, the attackers parcel their 'workload'-their malicious code. This is similar to a smuggler who evades detection by bringing in small amounts of the consignments over a period  of time, rather than sneaking in the entire lot in one attempt.
Smaller pieces are easier to hide. This strategy obviates a long permission list which can trigger suspicion and give their game away. 

A new version of malware called Android.Lightdd attempted this. The first payload performs reconnaissance
and intelligence-gathering(model, language, country ,IMEI, IMSI, IS version), followed by the downloading of additional payload.


Related Articles:



Wednesday, January 4, 2012

Malware threatens Android phones - Part |

Crooks' arsenal ranges from mobile games to a simple map

Smartphone security firms have reason to worry. Malware threats to Android phones, which have positioned themselves in the smartphone category, are growing. This time, mobile crooks are targeting certain features that are popular on PC's but are found to be vulnerable on Android phones. For eg: unlike other smart phones with proprietary app store, Android phones keep their app stores 'open', exposing themselves to attacks by malware writers.
android-malware-google-sdk-download-what-is-malware-android-market-widgets-droid-apps-for-android

The Android phones offer a variety of applications that allow users to operate the  phone for requirements that are beyond voice. Typically, smartphone makers offer applications through their app stores. Wresting control of the app stores, however can allow malware writers to pick vulnerabilities in Android phones.

Following are some of the Android specific mobile threats:
AndroidOS.Tapsnake
A user who downloads this application assumes that it is the Android version of the popular "Snake" game.
However what happens is that the threat switches on the phone's GPS and relays information about the user's coordinates to the cyber criminal.

Andorid.Pjapps
Android.Pjapps is an example of a Trojan with backdoor capabilities that targets Android devices. As seen with previous Android threats, it spreads through compromised versions o legitimate applications. One of the applications carrying Android.Pjapps code is Steamy Window similar to other  compromised Android applications, it is difficult to differentiate the legitimate version form the malicious one once it is installed. During installation, however it is possible to identify the malicious version by the excessive permissions it requests.When run, both the legitimate and malicious versions of the application mimics  a steam effect on your Android devices screen. It even lets you wipe it off with your finger. The  aim of Android.Pjapps is to build a botnet controlled by a number of different Command and Control(C&C) servers.

Android.Rootcager
Android Packages(.apk) include the file "rageagainstthecage", which is a tool commonly used to root the phone. In legitimate circumstances, this file can be used by the owner of the phone to acquire administrative rights on his or her phone this case, rooting the pone can allow malware we call Android.Rootcager to form more than the usual activities not commonly allowed on droid phones. Android.Rootcager roots phone without user consent by performing activities such as taking screen shots, monitoring installed applications and downloading additional packages of code.


Related Articles:



Friday, December 30, 2011

Kudoz ... to people who contributed to Technology

2011 has being a great year for technology.  iPad, iPod to Aakash Tablet, Android, Ice Cream Sandwich Operating system, every one of them has changed how we see or think of technology. They have bought a new change in technology. But while all this happening, on the other side the people who bought these changes in technology were leaving this world.. This post is dedicated to all those people who have made this happen…

1] Steve Jobs (CEO, Apple Inc.)

steve-jobs-iPod-iPad-iMac-iPhone

The one who bought biggest change, father of Apple Inc Steve Jobs died on 5 October, he was suffering from cancer. He made people to look at technology from another view through products like iMac, iPod, iPhone, iPad… and such more products showed a different direction to technology.



2] Dennis Ritchie (Founder of The C language and The UNIX Operating System)


Dennis-Ritchie-C-Language-UNIX-Operating-System

He was an American scientist who helped shape the digital era. He created the C programming language and with his longtime colleague Ken Thompson the UNIX operating system. He received the National Medal of Technology from President Clinton in 1999. Though he was not popular amongst common people (the non-programmers :P)  it would not have being possible to see all those software’s we use in our day to day life for sure.

3] Paul Baran (Founded the Internet)

paul-baran-internet-ARPANET
Paul Baran in 1960 started a project which included “Data Packet Switching” which later evolved into ARPANET which further increased to matrix of networks which we call it “The Internet”.
Baran died in Palo Alto, California  at the age of 84 on March 26, 2011,[1][20] due to complications from lung cancer

4] John McCarthy (Father of Artificial Intelligence)

john-maccarthy-artificial-intelligence
John McCarthy (September 4, 1927 – October 24, 2011) was an American computer and cognitive scientist. He coined the term "artificial intelligence" (AI), invented the “Lisp” programming language and was highly influential in the early development of AI.
McCarthy also influenced other areas of computing such as time sharing systems. He received the Turing award for his major contributions to the field of AI, and many other accolades and honors, including the United States National medical of Sciences.

5] Jean Bartik (one of the original programmers of ENIAC)

jean-bartik-two-women-programmers
Jean Bartik (first from left)

She was one of the original programmers of ENIAC (the first computer). She was supposed to be first lady programmer. She quit her program and left this world on 23 march of this year. 

6] Jerald Lawson (Video game maker)

gerald-lawson
Gerald “Jerry” Lawson, creator of the first cartridge-based videogame console, died Saturday morning in a Mountain View, California, hospital, Wired.com has learned. Lawson was 70.
As an engineer at Fairchild Semiconductor, Lawson designed the electronics of the Fairchild Video Entertainment System, later renamed the Channel F, in 1976.
A lifelong engineer and tinkerer, Lawson was born in 1940 and grew up in a federal housing project in Queens, New York. As a kid, he operated a ham radio; as a teenager he earned money by repairing his neighbors’ television sets.
One of his Quotes
“The whole reason I did games was because people said, ‘You can’t do it,’” he told the San Jose Mercury News last month. “I’m one of the guys, if you tell me I can’t do something, I’ll turn around and do it.”
At 6:15 a.m. Saturday, Lawson died after apparently suffering a heart attack. He is survived by his wife, son and daughter. The family is planning a memorial service in mid-May.

7] Robert Galvin (contributed in finding Cell phone)

Robert-galvin
Robert Galvin (first from right)

 Robert Galvin, who over nearly three decades as Motorola's CEO transformed the maker of police radios and TVs into one of the world's leading electronics companies, has died. He was 89.
Galvin died Tuesday night in Chicago of natural causes, his family said.
Galvin oversaw Motorola's pioneering efforts in the cellular industry, including the creation of the first commercial cellphone in 1973 and the construction of the first cellphone network in the early 80s.

And many more like these... they will always be remembered and cherished.

Monday, December 26, 2011

Android Code name/Flavor?

Android will be releasing its new OS code named “Ice cream Sandwich”. Unlike Apple, which doesn’t update its OS frequently. After reading more about android I came to know that all the code name of android OS are some or other desserts!! And this is not the only thing…all of them are alphabetically ordered. Starting from Cupcake, Donut, Eclair, Froyo, Gingerbread, Honeycomb, Gingerbread. And the latest to come off course the Ice cream sandwich.
android-ice-cream-sandwich-market


Since the code name started with Cupcake, you must have started wondering what about earlier version before Cupcake? The pre- release version of android were Astro and Bender but could not be used due to trademark reasons.

The release of latest android OS made me think what must be the next OS code name? one name came to my mind “Jalebi” … :P but most of the other code name are US desserts.

Any ways let me know what you all think of…

Thursday, February 3, 2011

It's official - Mobile radiation is dangerous


The speculative fears of mobile phones being a danger to health in the long run, seem to be coming true. A latest government study talks about the harmful effects of not just using mobile phones but also the radiation from mobile phone towers. 


Radiation from mobile phones and towers poses serious health risks, including loss of memory, lack of concentration, disturbance in the digestive system and sleep disturbances, according to an inter-ministerial committee formed by the ministry of communications and information technology to study the hazards posed by mobile phones.


One India also reported that the damages may not be lethal for humans, but they worse for birds and insects as well. The committee has attributed the radiation effects to the disappearance of butterflies, bees, insects and sparrows. 


The government report also says that  mobile towers should not be installed near high density residential areas, schools, playgrounds and hospitals. "The localized SAR value as per the Indian guidelines standard is 2 watt per kg, averaged over a six minute period and using a 10 gram average mass. With higher SAR values of mobile handsets the public could potentially receive much higher radiofrequency exposure. We have recommended that SAR levels to be lowered down to 1.6 watt/kg, as prescribed by the Federal Communication Commission of US," said a member.



The eight-member committee, which included representatives from the health ministry, department of biotechnology and member secretary, DoT, has recommended that mobile phones not adhering to standard levels of specific absorption rate (SAR) - a measure of the amount of radiofrequency energy absorbed by the body while using a phone -- should be barred.



Member scientist, ICMR R S Sharma said that compared to Europeans, Indian cellphone users are more at risk for adverse affect of radiation due the country's hot tropical climate, low body mass index, and low fat content. "We have recommended amendment in the Indian Telegraph Act 1885 and rules so that only mobile handsets satisfying radiation standards should be permitted in the country," he said.




In another report, citizens are scared of the radiation from mobile tower in Andheri. 

In the past five years, more than 15 housewives living in Sher-e-Punjab colony in Andheri (East) have suffered from various forms of cancer. Although there is no proof of a direct link, residents are drawing parallels between the appearance of the first cancer case and the installation of the first mobile phone tower in the society nearly seven years ago. Based on a Hindustan Times report.



Neha Kumar, who has been studying the biological effects of mobile phone towers, said, “All these women don’t have any family history of cancer. Plus, all of them are within a certain radius of those mobile towers. All this is not a coincidence.”



So how do we minimise the damage in view of such grave consequences. The report adds -   

“While talking on mobile, keep calls short or send a text message (SMS). This advice should be especially relevant keeping in mind the children, adolescents and pregnant women” said the report.  The advice should be printed in the user manual by handset manufacturers.  

“Whenever possible, use cellphone when the signal quality is good. People having active medical implants should keep their cellphone at least 30 cm away from the implant” said the report.



Many a times we find ourselves complaining of bad network in certain areas. Mobile companies raise towers at every nook and corner to beat each other at network coverage. Are we compromising our health for better mobile connections?


Related Posts Plugin for WordPress, Blogger...follow kalekushal.blogspot.com