Android Security Internals – iProgrammer

Android Security Internals
iProgrammer
We all need to know about Android security – but a whole book dedicated to it? Can this be a good idea? The simple answer is yes but not for every programmer. The subtitle gives you a clue as to why – An In-Depth Guide to Android's Security Architecture.

“android security” – read more

Mike Janke Enters Wash100 List For Leadership in Mobile Security – GovConWire


GovConWire

Mike Janke Enters Wash100 List For Leadership in Mobile Security
GovConWire
Executive Mosaic, Tysons Corner, VA February 20, 2015 – Mike Janke, co-founder and chairman of Silent Circle, has been selected to this year's Wash100 list for the most influential leaders in GovCon for his leadership role in the mobile security market.

and more »

“mobile security” – read more

Microsoft delivers Outlook for iOS and Android security updates – V3.co.uk

Microsoft delivers Outlook for iOS and Android security updates
V3.co.uk
Microsoft has released updates for its iOS and Android Outlook applications, following widespread concerns about security. The updates aim to fix problems in the Outlook applications' security and enterprise management controls, and include new PIN

and more »

“android security” – read more

Has Equation Group hacked your hard drives? You won’t be able to tell.

The Equation Group’s ability to reprogram hard-drive firmware leaves corporate security pros unable to trust the devices because they can’t tell whether disks have been compromised or not.

“Once the hard drive gets infected with this malicious payload, it’s impossible to scan its firmware,” says Igor Soumenkov, principal security researcher at Kaspersky Lab. “To put it simply: for most hard drives there are functions to write into the hardware firmware area, but there are no functions to read it back. It means that we are practically blind, and cannot detect hard drives that have been infected by this malware.”

Beyond that, the tampering Equation Group does with the firmware can survive reformatting the disk and reinstalling the operating system, giving it “extreme persistence,” and providing invisible, persistent storage inside the hard drive, according to the Kaspersky report on the Equation Group.

To read this article in full or to leave a comment, please click here

Network World Tim Greene