Wednesday, 3 February 2016

Google kills a hacker bug, patches critical flaws

Yet again a news on security flaws in Android. Google has fixed a serious bug on Android that could remotely be exploited by email, MMS or link on a webpage which contains specially crafted media file. Also, Google patched seven critical flaws in their February patch for nexus devices that would affect the mediaserver service of the Android Operating System. The flaw would mean that your device could be remotely hacked when the mediaserver processes the files delivered by either email or MMS or through a webpage. The flaws affect Android 6.0 Marshmallow, Android 5.0 Lollipop and Android 4.4.4 Kitkat.
Google has also announced some equally serious bug in Broadcom Wi-fi driver that would allow the hacker to remotely corrupt the OS kernel and gain access to the device.
So overall, the February update has addressed 13 security bugs that included seven critical, five highly severe and two moderate. 

Thursday, 28 January 2016

New android ransomware using clickjacking to gain admin privilages

Now, another news on Android malwares and this time, it is on ransomwares. Hackers have found a way to get administrative privilages using these.
File-encrypting ransomwares have now targeted the Android devices. One such technique is the clickjacking technique that tricks the users to grant admin privilages. Clickjacking is a malicious technique of tricking the user to click something and thus getting access to the computer thereby revealing confidential information of the user's device. A clickjack will take an embedded form of code that has the potential to execute without the user's knowledge (like clicking a button that shows that you can download a file but executes some other function). 
As stated by pcworld, the ransomware applications targeting Android has been less significant due to its restrictions in application permissions. It is also stated that Android devices running on (atleast) 5.0 lollipop are protected from these ransomwares. But, most of the devices still run older versions of Android (older than lollipop). 
It's advised to all users to download applications only from trusted venders (or on Play Store which is highly recommended) to prevent any such ransomwares on your devices.

Thursday, 14 January 2016

Amazing drone display enters Guinness

Recent CES 2016 saw the unveiling of the new technologies that included drones as the future of aviation and technology. Yuneec electronic aviation had developed a done with the help of Intel 6th generation processors. A drone display that used 100 drones was conducted that has entered the Guinness book of records. Here is the link of that video
https://youtu.be/mOBQXuu_5Zw

Friday, 8 January 2016

Lenevo to phase out motorola

Lenevo's acquisition of Motorola in 2014 will now result in disappearance of Motorola brand name from the smartphone market.
In his interaction at the CES 2016, Motorola Chief Operating Officer Rich Osterloh said that Motorola beans would be phased out this year. However, lenevo would use the Moto brand name for it's high-end smartphones and the Vibe brand name for its budget phones.

Tuesday, 5 January 2016

Google patches critical flaws in Android

Again you heard of the security flaw in Android. Last time, Google has fixed some security flaws which included the core part of the system. This time also, it include the core of the system.
Google has fixed a dozen security vulnerabilities of which 5 are rated critical.This time, Android 5.0 and later are the versions affected.
You might think that you would have heard this on this vulnerability before. That's because month after month, the "mediaserver" service remains the most problematic component of Android. Google has copied and pasted almost every word from the same text every month for every component affected.
The critical vulnerability affects the core part of (Android) software which has got the access to permissions that the third-party apps do not have. Another flaw that exists in handling of bluetooth and Wi-Fi handling of the Android software. Other flaws include those that affect the kernel.
While it's a good news that Google's own security team discovered the flaw, it's surely not good to hear that the most popular mobile operating system has been affected by critical flaws.

Tuesday, 22 December 2015

Android N:Google may use online pool to name the new version

With Android Marshmallow (6.0) released and Android N undergoing development, much is anticipated on the name that must be given to it. In his recent visit to India, Google CEO Sunder Pichai was asked on why an Indian Dessert name was not given. Reacting to it, Sunder said that he would conduct an online poll to decide on it.
Yes.Google has decided to conduct an online poll to decide on the name. This is a good news for android fans across the world as many of them have been suggesting names in many online portals from the time Google started naming its OS versions after desserts. This way Google is indirectly making its users to contribute to their favorite platform.
So far, the following names have been getting a lot of traction from across the world: Android Nankhatai, Android Nutella, Android Nougat, Android Nut Brittle, Android Nerds.

Tuesday, 8 December 2015

Google patches crticial vulnerabilities in android

Any news on vulnerability would surely be like the striking of the thunder. Chill...This time its not a news on any new vulnerability discovered.
Google has released a new patch of security fixes for its Nexus devices that would fix the flaws which enabled the attackers to compromise the android device via spam mails, web pages and MMS messages. Firmware updates are being rolled out for supported Nexus devices and the patches will be added as part of Android Open Source Project. The updates address five vulnerabilities in which 1 is rated as critical, 2 rated as high and 2 rated as moderate.
A handful number of flaws were located in the OS' media processing components that handle audio and video file playback parsing. One of the critical vulnerabilities is said to be located at a core part of the OS (mediaserver) that can be exploited with the privileges that third-party applications are not supposed to have. Attackers would trick the users into playing specially crafted media in their browsers or using MMS messaging.
Another critical vulnerability is the privilage escalation of Android kernel. This allows the applications designed by attackers to execute code at the root level. This vulnerability has been patched in the updated.