Last Updated: February 23rd, 2012
I'll admit it, I'm anal about CPU and RAM usage. I'm the kind of person that goes into MSConfig every 6 months to scrape useless startup processes like barnacles off the hull of a ship to keep boot times down and squeeze every last possible increment of free RAM and CPU that I can (insert "Then you should use Linux" joke here) out of my system. If you're like me, then you probably avoid heavy, suite-ized security solutions like the bubonic plague crossed with bird flu.
Last Updated: February 13th, 2012
Yesterday, a security firm called zvelo demonstrated a vulnerability within Google Wallet, cracking its PIN verification system using brute force, giving Wallet access to anyone who had the exploit. It was also revealed that the hack only worked on rooted devices, and Google swiftly reported that a fix for the bug was already being worked on.
Adding to Google Wallet's security worries, a new hack was posted online today, claiming to give access to Google Wallet (sans PIN) on non-rooted devices, requiring just a few steps to gain user information (and funds).
Last Updated: February 5th, 2012
Thanks to our two-dozen (or so) previous book giveaways, you probably now know how to develop for Android. If so, it's probably time to kick your game up to the next level by mastering application security. Luckily for you, O'Reilly Media recently published a new book on the topic, titled "Application Security for the Android Platform: Processes, Permissions, and Other Safeguards." Written by Jeff Six, the book is a concise (112 page) treatise on the subject.
Last Updated: March 6th, 2012
We know, we told you our holiday giveaway series would feature some of our largest contests to date. And it did - we gave away over a dozen tablets and nearly as many phones to our readers. But we thought we'd start the new year off with our biggest giveaway yet (an international one, to boot) - 10 Samsung Galaxy Nexus smartphones, courtesy of our amazingly generous friends at AVAST Software.