• contact-us
  • Top  blogs

    Enter your email address:

    Delivered by FeedBurner

    Enter your email address:

    Delivered by FeedBurner

    K3WAWNTDNQD6
    www.blogtopsites.com/technology/" title="Technology Blogs" target="_blank">www.blogtopsites.com/v_159855.gif" alt="Technology Blogs" />
    www.blogtopsites.com" style="font-size:10px;">blog sites

    hi tech

    hi tech
    المصدر: http://www.doaib.com/2011/07/how-to-add-image-slider-to-blogger.html#ixzz2VwyPCBug

    Thursday, July 4, 2013

    Android devices to 99% of them affected by a huge flaw


    The security team Bluebox discovered a huge flaw. Indeed it would be possible to modify the code a apk (note: this is the file to install an application) without the signature of the application is changed. This would allow a hacker to convert any application into virus or trojan and unusable mobile using the said application or use the phone at the expense of the owner. The main drawback inherent to Android is that once the Trojan is installed, it has access to all the phone. We can then see the value of a closed system like Apple. Even if a Trojan or virus took advantage of a flaw in Apple's mobile system, it could not access the system.

    This issue is particularly important as it is for 4 years and can be used on all devices with Android Donut version is 1.6. This would be nearly 900 million handsets.

    At the moment the fault was discovered by a security company who passed last February. It would seem that no hacker has not used.

    Good news for owners of Galaxy S4, ComputerWorld says that mobile Samsung would already have the patch removing this flaw.

    This major flaw will allow to see the responsiveness of Google and manufacturers. This can prove to be a choice in your mobile future. The latter being increasingly used and contains more and more personal data.

    The fault will be shown in detail at the Black Hat conference in Las Vegas, which runs from July 27 to August 1, 2013.

    I advise you to be careful when downloading applications, especially if it comes from unknown sources.

    0 comments:

    Post a Comment