Tag: Android

Nokia data shows a steady increase in infected mobile device traffic. (Image courtesy of Nokia.)

Android Malware Doubled in 2016, Adding to Mobile Malware Problem

In-brief: Smart phones infected with Android malware jumped 95 percent between 2015 and 2016, part of a steady increase in mobile phone infections in recent years, Nokia said on Monday.

Many of the CIA hacking tools disclosed by Wikileaks target known or patched security holes, security experts say.

MEH CIA: Agency’s Hacking Tools Targeted Known, Patched Holes

In-brief: Two days after the site Wikileaks dumped thousands of pages of information about covert CIA hacking tool, the security and technology communities have weighed in. Their verdict? Meh. 

A database containing 900 gigabytes of customer data and support requests for the Israeli firm Cellebrite was stolen and leaked to the website Motherboard. Cellebrite makes technology that helps law enforcement agencies get data off of mobile devices.

Surveillance Technology Vendor Cellebrite Has Customer Data Stolen

In-brief: Cellebrite, an Israeli firm that sells mobile phone forensic tools, was the victim of a hack that stole information on customers – many of them law enforcement agencies and governments.

Barnes & Noble denied that some of its low-cost NOOK tablets were running software that had been observed siphoning off user data in some low cost Android phones. (Image courtesy of Barnes & Noble)

Barnes & Noble says Nook Tablets will drop Suspect Chinese Software

In-brief: Barnes & Noble said its Nook tablets have not been used to steal data and that it is taking steps to stop using software by the Chinese firm Shanghai Adups Technology Co. Ltd. (ADUPS).

In flight entertainment systems may pose security risk the security firm IOActive warned.

Update: Researcher Calls In-Flight Entertainment Hacks a Safety Threat

In-brief: Research from the firm IOActive has discovered exploitable holes in in-flight entertainment software from the firm Panasonic Avionics that may make planes vulnerable to hacking and manipulation. Editor’s note: updated with comments from interview with Ruben Santamarta of IOActive. PFR 12/21/2016