After learning that yesterday's XYBoard root (which was thought to work on all Gingerbread/Honeycomb Moto devices) didn't play nice with Motorola's Xoom Family Edition, highly respected security researcher Dan Rosenberg decided to have a look, hoping to bring root back to the FE.
In a post to his blog earlier today, Rosenberg announced that he has found a working exploit for rooting the Xoom Family Edition. Rosenberg has again beaten others to the punch, namely a developer called Evil_DevNull, who Rosenberg calls out in the post for the alleged plagiarism of a previous FE exploit.
Following the discovery of two security exploits within Google Wallet, the Vice President of Google Wallet and Payments, Osama Bedier, released a statement reassuring readers that Google takes "concrete actions" to protect its users. The statement further indicated that, in response to Wallet's security scare, Google has put prepaid card provisioning on hold, at least until a permanent fix is issued (which should happen "soon").
Update 2/14/12: Prepaid card provisioning has been restored:
Yesterday afternoon, we restored the ability to issue new prepaid cards to the Wallet.
Update: You can download a batch script to root your DROID 4 now (you'll need to have USB debugging and Unknown Sources enabled in the Application settings menu). Find the file on this page, and if you can spare it, take the time to donate to Dan Rosenberg for finding the exploit. All proceeds will go directly to charity, in this case, the American Red Cross.
Widely known and respected security researcher Dan Rosenberg has evidently uncovered a root method for the Droid 4, in addition to a universal Motorola root method.
Yesterday, a security firm called zvelo demonstrated a vulnerability within Google Wallet, cracking its PIN verification system using brute force, giving Wallet access to anyone who had the exploit. It was also revealed that the hack only worked on rooted devices, and Google swiftly reported that a fix for the bug was already being worked on.
Adding to Google Wallet's security worries, a new hack was posted online today, claiming to give access to Google Wallet (sans PIN) on non-rooted devices, requiring just a few steps to gain user information (and funds).
Pay attention to the name Dan Rosenberg, it's one that you're going to want to know for the future. He's the guy who brought us root for the Lenovo Thinkpad Tablet, and now he's back with a root method for the Sony Tablet S. His blog post on how he figured out the exploit is an absolutely fascinating read, albeit quite technical. Even if you don't understand the post in its entirety, you can still appreciate the genius at work to construct such a clever exploit.
Justin Case has done it again, bringing root access back to users of Amazon's Kindle Fire who accepted the recent firmware update to version 6.2.2. BurritoRoot 2 is an easy-to-use exploit that only requires adb (Android debug bridge) and a few moments of your time. Users looking to root their device after Amazon's latest firmware update can grab BurritoRoot 2 using the download mirrors below.
To use the exploit, just download the file and run the following commands from adb:
adb push BurritoRoot2.bin /data/local/
adb shell chmod 777 /data/local/BurritoRoot2.bin
adb shell /data/local/BurritoRoot2.bin
adb shell id
<if uid = 0 continue, if not start over>
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
adb install Superuser.apk (skip this step if its already installed)
For more information, check out Justin's original thread over at XDA.
Update #1: Well, that was much faster than anyone expected - RIM has already released the patch for this exploit. The good news is that the patch isn't yet available in the 2.0 Beta, but you can bet that it will be rolled into the update before it hits the masses in its final form. If you happened to accept the update on the current version and still want to give this exploit a try, then you can always downgrade the OS.
According to a group of computer scientists at North Carolina State University, a vulnerability exists within many Android devices that would allow hackers (or malicious apps) to bypass the permissions request process and tap into audio and location, wipe apps and data, or send unauthorized SMS messages, all without the user knowing.
This news may sound a bit sensational, but the researchers have created and tested a dummy app which effectively demonstrates the exploit:
Among the eight phones tested with the researchers' diagnostic app (Woodpecker), HTC's Evo 4G seemed to be the most vulnerable, able to "leak" eight different capabilities to their dummy app, which was not explicitly granted appropriate permissions by the user.
If you've received the new version of the Android Market on your phone, you might have noticed among the legion of additions to the app a very noticeable subtraction: the "Just In" section. Some people don't like this.
In fact, there is a growing thread over at Google Support with a number of complaints about this change. Of course, the complaints are pretty exclusively from developers. Now, some of these complaints are made from a legitimate perspective - new developers who want exposure.
Every year, Defcon brings about some new concepts, hacks, vulnerabilities, and other digital tomfoolery. Sometimes it's all in good fun, but other times it's all too scary, which happens to be the case with a new class of Android malware that could allow for phishing attacks and pop-up ads alike.
Thanks to a design flaw in Android, there is a "feature" that allows an application to steal focus and pull itself into the foreground, bypassing the notification system entirely.