Security expert warns hackers can attack Android

SHARE:

Riley Hassell, who caused a stir when he called off an appearance at a hacker's conference last week, told Reuters he and colleague Shane Macaulay decided not to lay out their research at the gathering for fear criminals would use it attack Android phones. He said in an interview he identified more than a dozen widely used Android applications that make the phones vulnerable to attack. "App developers frequently fail to follow security guidelines and write applications properly," he said. "Some apps expose themselves to outside contact. If these apps are vulnerable, then an attacker can remotely compromise that app and potentially the phone using something as simple as a text message." He declined to identify those apps, saying he fears hackers might exploit the vulnerabilities.



 A mobile security expert says he has found new ways for hackers to attack phones running Google Inc'sAndroid operating system.
Hassell said he and Macaulay alerted Google to the software shortcomings they unearthed. Google spokesman Jay Nancarrow said Android security experts discussed the research with Hassell and did not believe he had uncovered problems with Android. "When you release a threat and there's no patch ready, then there is mayhem," said Hassell, founder of boutique security firm Privateer Labs. "The identified bugs are not present in Android," he said, declining to elaborate. It was the first public explanation for the failure of Hassell and Macaulay to make a scheduled presentation at the annual Black Hat hacking conference in Las Vegas, the hacking community's largest annual gathering. They had been scheduled to talk about "Hacking Androids for Profit." Hundreds of people waited for them to show up at a crowded conference room. Hassell said in an interview late on Thursday the pair also learned -- at the last minute -- that some of their work may have replicated previously published research and they wanted to make sure they properly acknowledged that work. A mobile security researcher familiar with the work of Hassell and Macaulay said he understood why the pair decided not to disclose their findings. "This was a choice we made, to prevent an unacceptable window of risk to consumers worldwide and to guarantee credit where it was due," he said.Hassell said he plans to give his talk at the Hack in The Box security conference in Kuala Lumpur in October. "When something can be used for exploitation and there is no way to fix it, it is very dangerous to go out publicly with that information," the researcher said. "When there is not a lot that people can do to protect themselves, disclosure is sometimes not the best policy."


via : reuters

COMMENTS

Name

4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,5,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,28,android phones,2,Anonymous,3,Antivirus,1,app,24,App Development,6,apple,32,apps,5,Artificial Intelligence,8,Assurance,1,asus,1,Audi,2,auto,7,automation,2,automation software,11,automotive technology,11,banking,1,Big data,2,bitcoin,3,BlackBerry,5,blockchain,4,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,18,Business Analytics,2,Business Intelligence,1,Business lesson,18,Business models,6,business strategy,24,Business Strategy Model,16,Business Success Story,7,business techniques,24,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,3,cryptocurrency,2,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,27,data,3,data recovery,1,deals,1,Dell Streak,1,development,9,devices,2,DevOps,1,digital currency,1,digital marketing,23,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,8,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,11,Enterprise Security,2,enterprise technology,9,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,fintech,1,firefox,2,firefox os,2,Flipkart,2,Front-end Development,3,future business,10,future technology,34,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,18,hacking,14,hardware,5,Healthcare,1,HealthTech,1,Home Automation,1,Hosting,3,How To Guides,22,How Tos,17,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,14,innovation,52,internet,8,Internet Explorer,1,Internet of Things,8,Inventory Management,1,ios,18,IoT,10,ipad,8,iPhone,14,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,JavaScript,4,JS,1,Kubernetes,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,28,mobile apps,30,mobile broadband,1,mobile enterprise,15,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,4,open source,1,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,4,programming language,5,Python,1,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,4,Search Engine Optimization,2,security,15,Self Driving Cars,11,SEO,9,smartphone,14,SmartTech,1,SME,1,sms,1,Snapdeal,2,social media,12,social network,11,software,14,Software as a service (SaaS),5,software development,17,software methodology,8,Software Outsourcing,2,software review,4,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,3,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,The Internet Of Things,2,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,2,video editor,2,virtual phone,1,Virtual Reality,4,Volvo,2,VPN,3,VR,2,Wearable gadget,2,Wearable Tech,2,Web 4.0,3,Web Development,9,web technology,12,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,3,workplace,2,X Mountain Lion,2,xcode,1,xp,1,
ltr
item
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: Security expert warns hackers can attack Android
Security expert warns hackers can attack Android
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfpzV87d678537kbxsnYLaRtAVF9np-U_NixrOaQ9lSuVTy1G-3_nHtBaqltP5OnIL7lapmP7L8HG2YIW1Sj9QeJU6Sj0IHBNNuSyb3GFRP72YQeoxY_yneaI02CqIfiusrVGcUpQpcGs/s200/Android-Logo-Leaning-.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfpzV87d678537kbxsnYLaRtAVF9np-U_NixrOaQ9lSuVTy1G-3_nHtBaqltP5OnIL7lapmP7L8HG2YIW1Sj9QeJU6Sj0IHBNNuSyb3GFRP72YQeoxY_yneaI02CqIfiusrVGcUpQpcGs/s72-c/Android-Logo-Leaning-.jpg
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
https://www.techfond.in/2011/08/security-expert-warns-hackers-can.html
https://www.techfond.in/
https://www.techfond.in/
https://www.techfond.in/2011/08/security-expert-warns-hackers-can.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy