In a recent study, the Department of Home Land Security (DHS) and the FBI reported 79 percent of all malware targeting mobile devices was directed at Android devices. There is also concern over the amount of users still using older, more vulnerable versions of the OS.
As Google improves Android, more disparaging press for the world’s most popular mobile operation system.
Finding software vulnerabilities is a full-time job for some people, but for another group, discovering a flaw in popular software can be like striking gold — either buy making victims pay up or getting paid via bounty hunter programs.
To better understand why discovering flaws is so popular, we’ll examine what a software vulnerability is and most importantly what can be done with it.
ITSEC defines a vulnerability as “the existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved.”
Wearable computing is a hot topic as of late.
From smart watches like the rumored Samsung Galaxy Gear, to augmented reality, what was once the realm of science fiction is rapidly become present day reality.
The introduction of Google’s latest project, Goggle Glass, has really brought this to the forefront.
As I have mentioned before, I am an incorrigible technology junkie. It is obvious that Google Glass was something I would lust over. Alas, unless you have signed up for the Goggle Glass explorer program, they are unavailable to the public, as of yet. It looks like I am going to have to wait until it is available for us plebes to try it out.
While researching Goggle Glass, I came across one of their competitors, GlassUp, a simpler device with a monochrome display and see through technology. It pairs up with your smart phone and displays notifications, alerts, emails and the such. I am very tempted to get these.
Picture courtesy of http://www.glassup.net/
Apple, for the most part, has been able to escape the wrath of malware authors compared with its main competitor, Android.
When talking about malware on iOS, most of the time we hear more about proof-of-concepts getting into the App Store than actual malware.
However, researchers from the Georgia Institute of Technology have discovered a way to circumvent Apple’s “walled gates” and managed to get an app with malicious behaviors past Apple’s review process. Dubbed “Jekyll Apps”, these apps look benign on the surface but contain hidden code revealed at run-time.
Recently, I posted a blog about analyzing PDF files. In that post, we covered some basics of the PDF format and then examined an infected PDF to observe the malware infection.
In this post, we’re going to do something similar, except this time using Microsoft Office.
Just like the PDF, most of you reading this are already familiar with Microsoft Office. If you’ve ever had to Continue reading