Microsoft Windows Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 25 July 2013

Android Hackers Infect Phones in China

Posted on 02:49 by Unknown
A new bug in the Android system has been exploited by hackers, allowing them to infect legitimate apps to spy on users. 

Two legitimate Android apps originating from China have been discovered to have an infection that uses the Android "master key" security holes.BlueBox, a security organization, originally discovered the vulnerability earlier this month. Symantec then recently released a report about the attacks. "We expect the attackers to continue to leverage this vulnerability to infect unsuspecting user devices," stated the report. The infections are based in code which allows the hackers to spy on and control the phone remotely. The apps which were infected are reportedly used to schedule medical appointments. 

"Symantec recommends users only download applications from reputable Android application marketplaces," stated the company in an effort to minimize the number of attacks through educating users on safe phone use. Users also still have full ability to remove the infected apps and software. Unfortunately, the nature of the Android market makes it difficult to fix the security issue quickly or efficiently. Because Android systems are distributed by many different companies in many different places, a single update is therefore difficult to get to all Android users at once. But Android isn't the only platform which has experienced security breaches lately.Apple just had a major security breach within its developer portal, potentially compromising over 200,000 developers. As hackers get increasingly good at finding security holes across all kinds of platforms, it becomes more and more important for both users and providers to focus on digital security regardless of operating system or device. 
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • how linux is built
  • Samsung Electronics has bought Boxee
    Samsung Electronics has confirmed its purchase of Boxee on Wednesday for its  smart TVs .  Samsung plans to use this acquisition as a way to...
  • Another Microsoft Guru Steps Down
    Microsoft announced on Monday that company veteran Craig Mundie has stepped down from his post as chief of research and will retire in th...
  • Dr. Dre Top As The New Hip-Hop’s Top Earner
    Six years ago Dr. Dre was walking   for more click here
  • Microsoft new Windows, tablet
    US computing giant Microsoft on Tuesday gave an early peek to the key Chinese market of its new tablet computer and Windows 8 software, pr...
  • Thought words
    “ Greatness lies not in being strong, but in the right using of strength. ” — Henry Ward Beecher
  • How to Move Your Email to Another Mac
    If you use Apple's Mail application, there will probably come a time when you'll want to move your email messages and email account...
  • How To SSH Hop With Key Forwarding from Windows
    In this guide we’ll explain how to SSH to a Linux machine from Windows with your public key, using Putty & Winscp. In addition, we wil...
  • Japan's largest solar and wind power project breaks ground
    Seven Japanese companies have been celebrating the ground breaking of their solar and wind power project at a ceremony held today at the ...
  • How to Recover a Deleted File
    It’s happened to most of us. You delete a file and realize you need it back. This guide will explain when you can get that file back and how...

Categories

  • 3 D printers
  • 360s
  • amazon
  • android
  • animation
  • apple
  • bing
  • book
  • boxee
  • browser
  • china
  • chrome
  • console
  • dicaprio
  • domain
  • ecommerce
  • facebook
  • ferrari
  • finland
  • gadget
  • galaxy
  • games
  • gmail
  • google
  • hosting
  • HTC
  • internet
  • ipad
  • iphone
  • iphoto
  • iwatch
  • japan
  • keyborad
  • lenovo
  • linux
  • lunar
  • microsoft
  • mobile
  • moon
  • movil
  • ms
  • names
  • new tech
  • Nokia
  • online
  • password
  • pc
  • phone
  • retails
  • samsung
  • search
  • smartphone
  • software
  • space
  • tablet
  • tech
  • text messages
  • track
  • trip
  • usres
  • web
  • whatsapp
  • whois
  • window
  • words
  • xbox

Blog Archive

  • ▼  2013 (160)
    • ►  December (1)
    • ►  November (9)
    • ►  September (5)
    • ►  August (8)
    • ▼  July (19)
      • Android Hackers Infect Phones in China
      • How to Easily Transfer Files Between Nearby Smartp...
      • How to Improve Your Android Phone’s Automatic Brig...
      • How to Automate Your Workflow in Adobe Photoshop
      • How to Setup Your Laptop with Tracking Software in...
      • How to Erase Windows 8′s Sync Data From the Cloud
      • Why Can Linux Systems Sometimes Recover Data Windo...
      • How to Test if Your ISP is Throttling Your Interne...
      • How to Install Ubuntu Linux on Your Chromebook wit...
      • How to Play Games with a Physical Controller on Yo...
      • How to Play Games with a Physical Controller on Yo...
      • How to Show Google / Gmail Contacts in the OS X Co...
      • Disabling Bing From the Windows 8.1 Search Engine
      • How to Find Your Lost Android Phone, Even if You N...
      • How to Stop OS X from Changing the Display Brightn...
      • How to Use Quick Toggles on Your Android Phone
      • How to Sync Files Between Computers Without Storin...
      • How to Fix Flash Videos Having No Sound in Chrome ...
      • Samsung Electronics has bought Boxee
    • ►  June (12)
    • ►  May (23)
    • ►  April (3)
    • ►  March (5)
    • ►  February (18)
    • ►  January (57)
  • ►  2012 (340)
    • ►  December (25)
    • ►  November (34)
    • ►  October (24)
    • ►  September (27)
    • ►  August (26)
    • ►  July (46)
    • ►  June (83)
    • ►  May (42)
    • ►  April (33)
Powered by Blogger.

About Me

Unknown
View my complete profile