Monday, 14 March 2016

This life saving feature is truly amazing: Android N developer preview

If you are in an emergency situation (medical emergency), think of the situation where your phone would be your life saver. Seems like a dream right?Nope. Android N has a new feature added into it that would do so.
In the Android N developer preview, Google has added an option to include medical details and personal contact information (also your medical emergency contact). When you guys setup a new phone on N developer preview, you would be asked to add these information (although this is optional). You can add your name, birth date, address and medical info like blood group, medications, allergies and a contact which comes in handy in such emergencies. This way the responders can use the emergency button on your phone (locked phone). 
If you have not done it in the beginning, you can find it in settings > User at any time in the future. This feature is surely a welcoming feature in Android N. Hope that Google would bring this feature to the consumer version.

Friday, 4 March 2016

New attack hit android and iOS devices, can the steal crypto keys of your device

Last time I talked about mazar virus that hit Denmark and other European nations. This time there is another report on an attack that can steal your crypto keys
Well, if guys don't know where you use the crypto keys here it is. Crypto keys are used to protect your pay accounts, wallets and many of the high value assets. So how is this done?
The exploiters use the side-channel attack that is based on Elliptic Curve Digital Signature Algorithm. This algorithm is used because it is faster than other crypto systems. It can be done when cryptographic operations are being done and by measuring the electromagnetic radiations. This way full extraction of data can be done. The attacker can perform such actions by measuring them using a simple magnetic probe, or using an USB cable of your phone and a USB sound card. It is said that researchers were able to fully extract the secret keys from OpenSSL.
The researchers from Tel Aviv university and University of Adelaide have published (separately) on how to extract the ECDH keys from a standard laptop. Although, this uses sound emitted by devices rather than the electromagnetic emanations that is used in the case of mobile phones.