Skype + Android + Bug = ?

image

Do you know the solution to this question? A spy trouble. This is what you get as a result, when you combine these three elements. Why? Well, there is this annoying and potentially dangerous bug, which allows the unwanted guests to spy on your conversations and messages. Only on Android devices.

For the time being there is only one efficient solution available. You have to log out as soon as you are done with your Skupe communication. Unfortunately, this is not an extremely practical thing to do, is it? If Skype cannot be on all the time on your smartphone, then what is the use, in the first place?

For what is worth, Microsoft is fully aware of this problem. While we are writing this, its development teams are already on it, fixing it. The trouble with the curve in this story is actually a simple one. You cannot never be safe, enough. Which brings us to one of our most used sayings in the field of cyber security.

If you have nothing to hide, then you have nothing to worry about. Right? At least this is what the NSA has to say to you. Nothing more. Nothing less. However, this is a weak comfort for the millions of Skype users, who are sharing their most intimate thoughts through it. You have a Skype call? Are you going to answer it, or what?

The Malicious Money Making Machine

image

Is it worth it? This is a simple question we are very likely to ask the hackers all over the world. Is it worth of all the risk? Apparently, it obviously is. The recent Symantec findings in this field have shed some additional light on this matter. It turns out that hackers move in the quite usual business ways.

They are in the constant search for the profit itself. Now, prepare yourself for the huge surprise. One Android bot network, which has more than 100,000 mobile devices under its direct control, cumulates more than $3 million net profit per year. How about that for the ground shaking change?

Can you imagine what it can do with 10 or 100 million infected mobile phones? We are talking about millions and millions of dollars flowing like rivers in the cyber world. It seems that the hackers are more alike modern businessmen, than the traditional idealists and anarchists hoping to change the world itself.

We have identified the primary motive for the hacker’s actions. Now, all we have to do is to ruin their malicious business. How? In the first place, we should increase the costs associated with their businesses by improving our cyber security measures. To decrease its profitability, in order to increase our security.

Binder A Bitter Reminder

image

What in the world is that? Well, you will have to be a little of an Androidnrocket scientist to fully understand it. Yet, who wants to be a rocket scientist when your cyber security is under a serious jeopardy, such as this one? The Binder itself has its roots deep into the core system of the Android itself.

Speaking about the devil hidden in those deep cyber roots, this is where all the fun begins. As soon as the hackers get their hands on your Binder, they own you literally. They can play with your Android device in the most unimaginable ways. So, what are we supposed to do about it? And Google?

Well, the new Android 5.0 is supposed to offer a poisonous Lollipop to all potential hackers. Yet, the trouble is we do not know it for sure. First, we need to test in order to trust it completely. Now, the clock is ticking and we are blinking. Are we in the trouble already, and how long we will have to wait?

This story should deliver a strong moral for the Google itself. What could it be? You should not allow yourself a luxury of waiting for the next major OS version in order to fix all problems, which go deeply to the very core of the system itself. We will see how will enjoy the new taste of the Lollipop, we or the hackers?

FinSpy Don’t Cry For IOS

image

The busy little bees from the Gamma Group has come up with an intriguing report. They have used something called the FinSpy to test the malware resistance strength of Android, IOS, BlackBerry, and some older versions of Windows Phone. The results? Well, they are both interesting and controversial.

It seems that the FinSpy was able to do its dirty work on all of these except the IOS. To be honest, even iPhone could not resist the true force of its malware dark side. However, this malware was able to penetrate iPhone’s only when it was in a so-called jailbreak mode. Intriguing enough, isn’t it?

On the other side, we do not want you to get the wrong impression that with an iPhone is nothing to worry about. The SpyFin is the legitimate cyber weapon used by the government agencies. Every iPhone has an open secret backdoor, which is more than enough to keep you restless about your privacy.

Our word of advice is, do not trust to results published by numerous surveys. Do not even trust your own smartphone. As a matter of fact, you should follow the golden NSA rule. If you have nothing to hide, then you have nothing to worry about. It’s really that simple. For your own good, do not be stubborn about this one. Will you?

Troubles Come In A Legit Disguise

image

It seems that modern hackers like to read the old books about the military strategy and the art of war. How else we are supposed to explain the sudden change of concept in the master design of the most malicious software? If you examine modern malware, you will notice an intriguing phenomena.

There is no need to attack the system, when you can skip it undetected. Why bother fighting, when you can do your job with a proper disguise. And, this is how we reached the point that top malware looks and works like a completely legitimate software. You realize that something is wrong when it is too late.

The new RAT or Remote Access Trojan for Android really does not have problems when it comes to a successful disguise in both paid and free apps. The more popular a certain app becomes, the more likely is that it carries an uninvited guest with it. So, what are we supposed to do in order to defend our Android territory?

Well, you do not have to be a general to know that new weapons on the battlefields simply call for new strategies and defense measures. If these malicious troublemakers can disguise themselves, then we can and should find a way to scan them properly before they hit the walls of our digital fortresses. Right?

IOS Secure Insecurity

image

It seems that the endless debate about the security prestige between Android and IOS just got an additional intriguing chapter. We have all witnessed how every now and then some of the Apple’s representatives likes to point out the security imperfections and vulnerabilities associated with Android.

The opened IOS backdoor allowed us for the first to seriously question its security strength. For what is worth, IOS sees to be properly strong on the outside threats, and unforgettably weak on the inside. We are talking about the enemies from within. Confused?

Apple’s mobile software is intended to be used for maintenance purposes only. Who is to deal exclusively with these types of works is another question? Maybe, some of the NSA agents would be more than interested to pay a surprising visit to your iPhone’s data.

The Apple’s users are disturbed with a proper reason. On the other side, Apple’s marketing machinery will do its homework in this case with a series of justifications and calming press releases. However, the damage is already being done. The Apple has lost its self-claimed aureola of flawless safety. For how long?

KitKat Security Smart

2177_imela_5

According to the most recent findings of IBM security experts, it seems that KitKat and other newer Android versions have a serious security flaw. The main focus of their report was the KeyStore segment of the Android OS. The things could not get worse in this matter for Android, could they? How are we to interpret these findings?

Well, this is definitely a bad news for all Android users. KeyStore is the most important and sensitive component for the proper security functioning of any system. It would be very interesting to see how Google will react about this one. We are also not sure whether or not the IBM can claim the bug bounty, in the first place?

For what is worth, being the number one platform for mobile devices in the world, certainly draws a lot of attention both positive and negative one. Living under the spotlights is definitely not an easy thing. However, Google has probably gotten used to it by now. What about the signature of these findings?

Well, we sure hope that Microsoft or Apple signatures are completely eliminated in these cases. Who is who’s best friend in this story is a question worth million dollars. It comes without saying that Android has been extremely successful. We sure hope that they will be dedicated enough to security issues solving, as well.

The Smartphone Which Knew Too Much

Image

It comes without saying that while two parties are fighting the third one takes an advantage. It is hard to believe, but Samsung actually used one of Apple’s intern document which includes Android. How about this one? This already sounds like an excellent crime story. So, what is so special about this allegedly top secret document?

It seems that Apple was terrified that Android could seriously damage iPhone’s sales. Apple’s sales team was worried that cheaper phones with bigger screens have better chances in the market compared with the smaller more expensive models. On the other hand, it is “refreshing” to see how Apple criticizes Samsung’s enormous marketing budgets.

For what is worth, even Apple can be petrified for a moment when it comes to the positioning troubles on the market. Even Apple has some serious difficulties to convince itself about its superiority. Its sales team has revealed with this document that Android got an unexpected recognition for the quality from the most formidable adversary in the market.

From this perspective, we can only wish for more trials of this kind in the future. Who knows what more can be revealed? Unfortunately, we need an official court procedure to learn more about the truth behind the high walls of our favorite IT giants. It seems that we definitely need some kind of WikiLeaks business or even smartphone edition.