Tag Archive for: Serious

Sinji Smart Wifi Camera – Get serious about home security for $60 – Android Authority (blog)


Android Authority (blog)

Sinji Smart Wifi Camera – Get serious about home security for $ 60
Android Authority (blog)
CCTV is dead. Outdated. Archaic low-quality footage which you have to review the next day just to get an idea if you've missed something. The Sinji Panoramic Smart WiFi Camera is the game-changer to step things up to 21st century. The camera (or …

android security – read more

Google Not Fixing Serious Android Permissions Issues Until Android O Release – Go Android Apps (blog)


Go Android Apps (blog)

Google Not Fixing Serious Android Permissions Issues Until Android O Release
Go Android Apps (blog)
If you have an Android device, then you are probably aware of the issues and flaws in the Android permissions. These flaws with the permissions end up putting Android users at a higher risk for malware, adware, and ransomware. Now, Google has confirmed …

and more »

android ransomware – read more

Serious app permissions flaw will not be fixed until Android O, leaving users at risk – BetaNews


BetaNews

Serious app permissions flaw will not be fixed until Android O, leaving users at risk
BetaNews
The security of Android has been questioned many times, but the general thinking is that installing apps from Google Play offers a decent level of protection. But research by Check Point shows that this is not the case due to a flaw in permissions.

and more »

android security – read more

Elegant 0-day unicorn underscores “serious concerns” about Linux security

Enlarge / A screenshot showing an exploit that takes full control of a fully updated version of Fedora. (credit: Chris Evans)

Recently released exploit code makes people running fully patched versions of Fedora and other Linux distributions vulnerable to drive-by attacks that can install keyloggers, backdoors, and other types of malware, a security researcher says.

One of the exploits—which targets a memory corruption vulnerability in the GStreamer framework that by default ships with many mainstream Linux distributions—is also noteworthy for its elegance. To wit: it uses a rarely seen approach to defeat address space layout randomization and data execution prevention, which are two of the security protections built in to Linux to make software exploits harder to carry out. ASLR randomizes the locations in computer memory where software loads specific chunks of code. As a result, code that exploits existing flaws often results in a simple computer crash rather than a catastrophic system compromise. Meanwhile, DEP, which is often referred to as NX or No-Execute, blocks the execution of code that such exploits load into memory. (Ars Technology Editor Peter Bright has much more about ASLR and DEP here.)

Unlike most ASLR and DEP bypasses, the one folded into the GStreamer exploit doesn’t rely on code to manipulate the memory layout or other environmental variables. Instead, it painstakingly arranges the bytes of code in a way that completely disables the protections. And by eliminating the need for JavaScript or other memory-massaging code to execute on a targeted computer, it’s possible to carry out attacks that otherwise wouldn’t be possible. Chris Evans, the security researcher who developed the exploit, describes the challenge as “a real beast.”

Read 6 remaining paragraphs | Comments

Technology Lab – Ars Technica