According to American sportswear giant Under Armour, user data from its health app MyFitnessPal has been compromised. Data including the usernames, email addresses, and scrambled passwords from approximately 150 million accounts was stolen last month in one of the biggest attacks of its kind.
AirDroid is one of several services that allows Android users to send and receive text messages, as well as transfer files and see notifications, from their computer. According to the Play Store, AirDroid has somewhere between 10 and 50 million installs (not counting anyone directly installing the APK from the AirDroid website). Mobile security company Zimperium recently released details of several major security vulnerabilities in AirDroid, allowing attackers on the same network to access user information and even execute code on a user's phone.
It seems that just about every major organization or service is being targeted for a gigantic data breach these days. Spotify was the latest service to be attacked, and yesterday the music streaming company specifically told Android users to upgrade their apps soon to protect themselves. The update is available today, but Spotify isn't taking any chances: it's created an entirely separate entry in the Play Store to make sure users get the point.
Melesta Games' Toy Defense, a tower defense-style game that's already found a home on iOS, made its way to Android today, bringing with it a familiar tower defense dynamic with turrets and enemies pulled straight from your childhood toy chest.
If you've played other tower defense games, you know what you're in for with Toy Defense – defend your "tower" using various upgradeable turrets, weapons, etc. as wave after wave of enemies march through. While Toy Defense doesn't invent a genre, it's a polished, thoughtful TD game that will undoubtedly please fans of the genre, while adding a few unique touches.
We've covered TeeFury's awesome Android offerings in the past, and today the online purveyor of t-shirts is back with a design inspired by vintage science fiction – The Android Attack by Adams Pinto. The shirt features our favorite green robot as a giant robot monster leaving the wreckage of a city in his wake and, for good measure, stomping on a defenseless piece of fruit I think we'll all recognize.
The shirt is just $10 right now, but that deal won't last forever – if you want to grab this tee, hit the link and place your order by the end of the day.
Our pal Andrew Schillinger - the "lead code monkey" (no, seriously) at AdultSwim.com - pinged us a few hours ago to let us know that Adult Swim has released its first Android app/game, and it's everything we'd expect from AS. It's called Robot Unicorn Attack, and it takes you though the dream world of a robot unicorn.
Robot Unicorn Attack finally arrives on the Android Market!
• "Creates an experience that is quite honestly too awesome for words." -Touch Arcade • "There's nothing better than storming the purple shores of some nameless land as a robot, rainbow-sh***ing unicorn to the beat of Erasure's 'Always'." -Kotaku • Compete with other Robot Unicorns via OpenFeint leaderboards and achievements • Finally, the addicting Internet sensation gallops majestically onto Android Market
With a great plugin comes great responsibility - to avoid malicious Flash files, that is. A zero-day exploit has been discovered in Adobe Flash that affects all Android versions of the software, Adobe announced today.
The most common vessel for the exploit is (fortunately) a Microsoft document (.doc) email attachment with an embedded Flash file (.swf) - and I'm not aware of any Word document viewers/editors in Android that support embedded Flash. Once the Flash file is executed, the exploiter can run malicious code on the target device. How, or whether, this could affect Android is unknown.
Still, it's important to remember that Adobe's products, ever the target of hackers and shady enterprise, share common elements across operating systems - including, at times, potentially dangerous flaws and exploits.
A new report from eWeek came out today stating that another researcher, Xuxian Jiang, this time from North Carolina State University, stepped forward with a tweak to the very same vulnerability Google reportedly patched. The new method circumvents protection put in place and allows an attacker, yet again, to access a user's SD card as well as the /system directory and directories that are open for reading in the Android sandbox.