CyanogenMod 7.0.3, an incremental release for CM 7, is now live at cyanogenmod.com. While we're waiting for the official changelog from Cyanogen himself, I can tell you that it does not contain Android 2.3.4 (it's still based off 2.3.3) - that's been saved for CM 7.1 (if you can't wait for 2.3.4, you can update to it by using the nightlies). It does, however, contain important security fixes, among other things.
Our smartphones are quickly becoming on-the-go computers, so it only makes sense that the amount of data that we access on them is becoming greater, too. When we want to share files between computers and our Android phones, there are quite a few services available - like Dropbox, for example. But there is one problem with services like Dropbox: security. Sure, they may be fine for uploading pictures of the family dog or easily transferring MP3s to your Android device, but what about sensitive data?
Skype released an update to its Android app this morning, remedying the vulnerability which exposed tons of personal info that we revealed last week. Our own Justin Case who originally found the issue has taken a look at the updated version of the app and confirmed that the exploit he developed to demonstrate the vulnerability no longer functions.
Specifically, Skype has changed the permissions of the databases (which contain the personal information) in question.
From today's "probably should have seen it coming" pile, Engadget has come into possession of what looks like a presentation slide for a ruggedized Android tablet being developed by Motorola:
I know, the text is illegible, so here are the main points to take home:
- 7" capacitive LCD
- 1GHz dual-core TI OMAP processor
- 1GB RAM, 8GB NAND onboard storage
- Android 2.3 Gingerbread
- 8MP rear camera, 1.3MP front camera
- Stylus for signature capture
- Removable battery good for 5.5 hours of video
- Can withstand 4' drop onto plywood (oak, cherry, ash, maple certifications pending)
- Works in temperatures of 0-50 degrees Celsius
- Tons of enterprise-friendly security
- Fingerprint scanner
This device is clearly targeted towards business, and probably specifically towards businesses with employees out in the field, where the tablet's ruggedized nature will protect it from the harsh, plywood-filled world.
Just another step in Google's efforts to make Android more appealing to businesses - an update to the Google Apps Device Policy application has added three new features to make your Android device more secure:
- Remote Location: Any Android 2.2+ device can be located remotely via GPS or by making it ring. The PIN or password can also be remotely reset.
- Data Encryption: Android 3.0 introduced data encryption, and now Google Apps users have the ability to encrypt this data remotely as long as the App Device Policy is already installed on the device.
The ability to locate your expensive bundle of joy, when lost or worse, stolen, is priceless. And arguably more so, is the capability to prevent whoever is using it from accessing your personal data and photos while placing premium rate phone calls to xxx numbers in Eastern Europe.
It's peace of mind that even if your phone is truly gone for good, then the biggest expense you'll incur will be a new handset, and hell, the insurance that you are paying through the nose for, should cover that.
In the world of Android and, specifically, Android power-users, there are a lot of things you can do and a myriad of tools you can do these things with. One of my favorite things in the world is getting several tools I use regularly consolidated into a single package. If you use your device with any kind of regularity, you know that there are several things you like to know, modify, kill, lock, or enable.
Have you ever been in a situation where you needed to remotely access an account but couldn’t remember its password? I know that I have done so all too many times, so I started looking for a secure solution to this quandary. Although there are several good options, I chose KeePass - read on to discover how you can too.
Before we begin, there are a few things you will need:
- KeePass on your computer (I use the “Professional Edition”)
- KeePassDroid on your Android Phone
- A Dropbox Account
- Dropbox for Android
- OI File Manager (required by KeePass)
On the Desktop
The first thing that you will need to do is install Dropbox, if you haven’t already.
One of the ways Android protects application users from unwanted activities is by requiring every app to declare a set of permissions and allowing users to view those permissions during the installation phase. Don't like what an app can do? Just don't install it.
However, this all or nothing approach doesn't allow you to selectively turn off specific permissions, so if you don't like that an application accesses your phone state, you can't just disable that and still have the app installed.
That didn't take long. A collaborative effort between numerous Android hackers just managed to crack the Thunderbolt's bootloader wide open, successfully booting a custom recovery image. They also incidentally discovered a new root method in the process. Credit goes to jcase, jamezelle, and scotty2 (and all of andirc) for working out the details, and ProTekk and Trident for putting their shiny new Thunderbolts on the line. Here's the visual proof:
Image credit: Trident, ProTekk
We'll keep you apprised on the situation with instructions on how to go about unlocking your own Thunderbolt as we get more information.