25
Feb
2012-02-25 09h01_58

A few months ago, Liam spent some time with 17 mobile security apps, one of which was an app called Cerberus. He came away quite impressed - so impressed, in fact, that he crowned it the winner (and, as a license is just $4, it was also crowned the best for the budget-minded).

The app is always free to download and comes with a 1 week free trial, but a lifetime license is normally $4.

21
Feb
unnamed
Last Updated: February 23rd, 2012

I'll admit it, I'm anal about CPU and RAM usage. I'm the kind of person that goes into MSConfig every 6 months to scrape useless startup processes like barnacles off the hull of a ship to keep boot times down and squeeze every last possible increment of free RAM and CPU that I can (insert "Then you should use Linux" joke here) out of my system. If you're like me, then you probably avoid heavy, suite-ized security solutions like the bubonic plague crossed with bird flu.

14
Feb
image

Following the discovery of two security exploits within Google Wallet, the Vice President of Google Wallet and Payments, Osama Bedier, released a statement reassuring readers that Google takes "concrete actions" to protect its users. The statement further indicated that, in response to Wallet's security scare, Google has put prepaid card provisioning on hold, at least until a permanent fix is issued (which should happen "soon").

Update 2/14/12: Prepaid card provisioning has been restored:

Yesterday afternoon, we restored the ability to issue new prepaid cards to the Wallet.

12
Feb
norton-id-logo

In an effort to keep all your passwords both safe and convenient, while also protecting your web surfing experience, Symantec has created Norton Identity Safe Beta, an app that allows users to store their login information on their computer and mobile device, while enjoying a safe browsing experience on both.

Many of you may be aware that there are several apps that perform this function already. SplashID Safe, Keeper Password & Data Vault, and others provide a very similar service, but Norton ID Safe brings a couple of key differences to the table.

10
Feb
image

Update: You can download a batch script to root your DROID 4 now (you'll need to have USB debugging and Unknown Sources enabled in the Application settings menu). Find the file on this page, and if you can spare it, take the time to donate to Dan Rosenberg for finding the exploit. All proceeds will go directly to charity, in this case, the American Red Cross.

Widely known and respected security researcher Dan Rosenberg has evidently uncovered a root method for the Droid 4, in addition to a universal Motorola root method.

09
Feb
image
Last Updated: February 13th, 2012

Yesterday, a security firm called zvelo demonstrated a vulnerability within Google Wallet, cracking its PIN verification system using brute force, giving Wallet access to anyone who had the exploit. It was also revealed that the hack only worked on rooted devices, and Google swiftly reported that a fix for the bug was already being worked on.

Adding to Google Wallet's security worries, a new hack was posted online today, claiming to give access to Google Wallet (sans PIN) on non-rooted devices, requiring just a few steps to gain user information (and funds).

02
Feb
bouncer

As Android has grown from a small hobbyists OS to the mainstream-conquering behemoth it is today, so has the amount of malware directed towards it. A large chunk of the problem comes from malicious apps that make it into the Android Market - often times, duplicates of popular apps with a few strings of code thrown in that allow the app to transmit personal information or hijack the device.

Makers of anti-virus apps claim that there's more malware in the market than ever, painting the picture of a wild west-esque place that's ever-more attractive to the scum of the app universe.

27
Jan
2012-01-27 13h57_37
Last Updated: February 5th, 2012

Thanks to our two-dozen (or so) previous book giveaways, you probably now know how to develop for Android. If so, it's probably time to kick your game up to the next level by mastering application security. Luckily for you, O'Reilly Media recently published a new book on the topic, titled "Application Security for the Android Platform: Processes, Permissions, and Other Safeguards." Written by Jeff Six, the book is a concise (112 page) treatise on the subject.

27
Jan
unnamed

Update: According to the Vopium blog, the app has been updated with a fix for this issue.  We'll crack it open in just a bit to ensure everything has indeed been addressed.

Users of the popular VoIP app Vopium (here's the older version with many more installs) may want to put all usage of the app on indefinite hiatus, at least for the time being. It was recently discovered that the app sends basically all of the sensitive information, including username, password, device IMEI, geolocation, and contact list in plaintext.

02
Jan
2011-10-21-17h07_013
Last Updated: March 6th, 2012

We know, we told you our holiday giveaway series would feature some of our largest contests to date. And it did - we gave away over a dozen tablets and nearly as many phones to our readers. But we thought we'd start the new year off with our biggest giveaway yet (an international one, to boot) - 10 Samsung Galaxy Nexus smartphones, courtesy of our amazingly generous friends at AVAST Software.

Page 11 of 18«First...910111213...Last»