blog trackingRealtime Web Statistics makers Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘makers’

Daz Dillinger Files Cease & Desist Letter Against “Grand Theft Auto V” Makers

  Daz Dillinger recently filed a cease and desist letter against Take-Two Interactive Software and Rockstar Games, the makers of Grand Theft Auto 5, according totmz.com. “C-Walk” and “Nothin’ But the Cavi Hit,” which appear in the video game, were used after 

View full post on Hip Hop Security

Makers of MamaBear Family Safety App Offer Back to School Internet Safety Advice

Tampa, FL — (SBWIRE) — 08/21/2013 – Parents and children across America are gearing up for an exciting new school year. But with all the excitement also comes worry: How safe are their children in their kid’s new physical surroundings as well as their technological environment when using smartphones, computers and other connected devices? Predators prey
[continue reading...]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Lawsuit: Cell makers violated Omaha firm’s patent

An Omaha company is suing five cellphone service companies for allegedly violating its patent on security technology that helps smartphones, tablets and broadband mobile cards access the internet.

View full post on cellphone security – Yahoo! News Search Results

View full post on National Cyber Security

Inventors, Entrepreneurs, and Makers of All Things Technical and Scientific Will Find Amazing Ideas and Tools to Make …

The USA Science & Engineering Festival hosted by Lockheed Martin offers a special appeal for budding entrepreneurs, inventors, engineers and programmers who will find the ideas, tools and resources to help them make their dreams a reality.

View full post on hacking tools – Yahoo! News Search Results

View full post on National Cyber Security

Car makers, U.S. worry about hacking of cars

Growing number of chips and other electronics in cars, as well as increased wireless connectivity, lead to worries that hackers and terrorists may take control of vehicles for nefarious purposes.

View full post on cyber security alerts – Yahoo! News Search Results

View full post on National Cyber Security

Car makers, U.S. worry about hacking of cars

Growing number of chips and other electronics in cars, as well as increased wireless connectivity, lead to worries that hackers and terrorists may take control of vehicles for nefarious purposes.

View full post on cyber security alerts – Yahoo! News Search Results

View full post on National Cyber Security

Android ‘spyware’ storm: Lawsuits loom, handset makers panic as ‘Carrier IQ’ claims software ‘does not’ spy on users

  • U.S. senator asks company to clarify ‘deeply troubling’ allegations
  • Lawsuit for privacy violation filed in Illinois
  • Nokia, BlackBerry, Apple distance themselves
  • ‘Carrier IQ’ claims it does not ‘record’ information
  • Still unclear if software is used by non-US networks

Last updated at 2:46 PM on 7th December 2011


Enlarge

 

The storm around the ‘Carrier IQ’ software used in US mobile phones has led US Senators to question the company, lawsuits, and questions over how many handsets carry the monitoring software – and what exactly it does

Spyware researcher Trevor Eckhart showed off a video this week demonstrating that ‘Carrier IQ’ – software buried deep within the operating systems of American mobiles to provide mobile carriers with information – might be snooping a little more than it should.

Eckhart’s demonstration showed the software ‘reading’ the contents of text messages and web browsing on an HTC Android phone, and transmitting the information.

Since then, handset makers such as RIM, Nokia and Apple have rushed to distance themselves from the software – portraying the ‘spyware’ as an Android-only problem.

Eckhart’s demo used an HTC phone (pictured).

Since then, US Senator Al Franken has asked the software company to respond to Eckhart’s claim – and an Illinois resident has filed a lawsuit against the company.

Illinois Erin Janek filed a lawsuit against Carrier IQ and handset maker HTC – which Eckhart used for his demonstration – alleging illegal interception of information.

Eckhart’s demo showed that the software, which is supposed to provide mobile phone networks with information on how handsets are used, ‘read’ and transmitted the contents of SMS messages, and also monitored web browsing.

Carrier IQ – whose software is used on millions of handsets across the US – released a statement.

‘While a few individuals have identified that there is a great deal of information available to the Carrier IQ software inside the handset, our software does not record, store or transmit the contents of SMS messages, email, photographs, audio or video,’ the company said.

‘For example, we understand whether an SMS was sent accurately, but do not record or transmit the content of the SMS. We know which applications are draining your battery, but do not capture the screen.’

Eckhart’s video demonstration appeared to show the company capturing information illegally – but Carrier IQ maintains it does not ‘store or record’ any records of SMS or web use

It’s still unclear whether the application does ‘log’ keystrokes – or, if so, how this data is used.

Handset makers rushed to distance themselves from the software, which is installed by phone networks to monitor usage.

Research In Motion RIM does not install, nor authorize, its carrier partners to install “Carrier IQ” monitoring software on its BlackBerry smartphones, the company said on Thursday.

RIM made the statement after a security researcher said the ‘Carrier IQ’ application, which can monitor what device users are doing, has been installed on mobile devices from multiple vendors without the knowledge or consent of customers.

Trevor Eckhart, the researcher who demonstrated in online videos how the software works, focused on devices using Google’s GOOG.O Android operating system, but he also mentioned other operating systems, including RIM’s BlackBerry and Nokia’s NOK1V.HE Symbian system as having the software installed.

Nokia also denied their phones used the software.

Handset makers such as Nokia, makers of the Lumia (pictured), said that Carrier IQ software was not installed on their handsets

‘CarrierIQ does not ship products for any Nokia devices,’ a company spokesman said.

U.S. Senator Al Franken asked software maker Carrier IQ to respond to claims by an independent security researcher that its products collect and transmit potentially sensitive data about millions of mobile phone users.

The video shows a piece of software tracking Eckhart as he turns his phone on and off, punches numbers to make a call and records text message in plain text.

‘The revelation that the locations and other sensitive data of millions of Americans are being secretly recorded and possibly transmitted is deeply troubling,’ Franken said in a statement. ‘Carrier IQ has a lot of questions to answer.’

In his letter, he asked the company for details on the types of data its software collects and what it does with that information.

ATT and Sprint Nextel both said they use the software in their devices to collect information that helps them improve network and service performance.

‘We do use carrier IQ, but we do not and cannot look at the contents of messages, etc., as some have speculated,” said Sprint spokeswoman Stephanie Vinge-Walsh.

Apple Inc said that some devices, including iPhones, that run on its iOS 4 operating system use the Carrier IQ software, but that it does not work with the newer iOS 5.

In a statement posted to its website last month, Carrier IQ said its software is used by network operators to help improve network quality and troubleshoot device problems.

“While we look at many aspects of a device’s performance, we are counting and summarizing performance, not recording keystrokes, or providing tracking tools,” the Mountain View, California-based company said.

Since Eckhart’s videos first appeared, a firestorm of criticism has erupted in online forums and on Twitter, where users complain about breach of privacy.

Carrier IQ immediately tried to suppress Eckhart’s report.

The
Electronic Freedom Foundation, an activist group which promotes free
speech online, said, ‘Carrier IQ fired off a cease-and-desist letter to
Eckhart, claiming that he infringed its copyrights and made unspecified
false allegations about its software.

Here’s what other readers have said. Why not
debate this issue live on our message boards.

The comments below have not been moderated.

The American government treat their own people like cattle – what frustrates me most is that the UK and Europe allow the U.S. to do the same with us. They sell us down the river for any price.

This is why it’s a good thing that Apple go through developers’ code with a fine toothed comb before approving it and publishing it on the app store.
- Mike, Manchester, 04/12/2011 14:28 ***********************
Well Mike, you are misinformed. Firstly Carrier IQ is not an app, and secondly, a researcher recently managed to have an Apple app published that contained malicious code. When he informed Apple of this he was barred from submitting new apps for 6 months, not the thanks you would expect when proving that the app submission process has its flaws.

Sonera of Finland HuaWei Ideos X5 Android demands ALL User information when entering an Application. This information may be sold forward by the ASP-Telecoms company for own benefit. Is this legal?

This is why it’s a good thing that Apple go through developers’ code with a fine toothed comb before approving it and publishing it on the app store.

I have what is a pretty dumb phone, an old Nokia, perfect for making phone calls and texting. I had a smart phone but the screen, whist relatively large, is pretty useless for displaying web pages. It was good for e mails but I don’t let e mails rule my life. It was also very expensive. So its gone and the dumb phone is back. I don’t need lots of applications to keep myself amused. Stuff big brother.

Apple FTW, Paignton wrote:”Apple do not do such a thing. Even there worst enemy, microsoft couldn’t find a patch on Apple” Well it’s nice to see such an unbiased, informative, reassuring and so well documented information…..

Apple do not do such a thing. Even there worst enemy, microsoft couldn’t find a patch on Apple

Release the software under the GPL so it is available for everyone to look at.

Just read the small print on EVERY app that you down-load,They have access To everything on your phone, and they track your every move,weather the app is on or not. On doing so you allow them do distribute every bit of information on your phone to all and sundry. BE Careful.

They all want to play Big Brother and invade one of our most important freedoms, that of privacy. All the claims of the info helping them to make a better phone are all a farce. The companies will now go into face saving mode to ensure that their sales do not slacken.

The views expressed in the contents above are those of our users and do not necessarily reflect the views of MailOnline.

We are no longer accepting comments on this article.

Article source: http://www.dailymail.co.uk/sciencetech/article-2069315/Android-spyware-storm-Lawsuits-loom-handset-makers-panic-Carrier-IQ-claims-software-does-spy-users.html?ITO=1490

View full post on National Cyber Security » Spyware/ Cyber Snooping

Android phone makers open up users to security threats

North Carolina State University researchers say some Android smartphone makers’ efforts to go above and beyond the Google mobile platform’s basics open their devices to security breaches.

“Some of these preloaded applications, or features, are designed to make the smartphones more user-friendly, such as features that notify you of missed calls or text messages,” says Xuxian Jiang, an assistant professor of computer science at NC State and co-author of a paper describing the research. “The problem is that these pre-loaded apps are built on top of the existing Android architecture in such a way as to create potential ‘backdoors’ that can be used to give third parties direct access to personal information or other phone features.”

Hackers could trick the apps into recording your phone calls or wiping out your settings, says Jiang, whose team used a tool dubbed “Woodpecker” to detect vulnerabilities.

Such smartphone flaws are welcome news to hackers, who see Android phones as an increasingly juicy target: Gartner says more than half of the smartphones sold worldwide in the third quarter run Android, and that’s double the number from the third quarter last year.

Vendors such as McAfee and Juniper Networks have recently released study results showing a boom in malware targeting Android devices, though Google has countered that some vendors may just be trying to roil up the market to sell more of their security wares. 

NC State researchers have had their eyes on Android security for some time. Network World spoke with Xuxian Jiang in April about an effort to defend Android users from privacy thieves. The NC State team’s privacy mode software, dubbed Taming Information-Stealing Smartphone Applications (TISSA), would give Android users more control over what information they divulge to makers of third party apps, both at the time of downloading the app and while it’s running.

Based on NC State’s latest research, on eight different smartphone models, Motorola Droid and plain Google reference implementations fared best. However, HTC’s Legend, EVO 4G and Wildfire S, Motorola’s Droid X and Samsung’s Epic 4G all showed significant vulnerabilities. NC State researchers say they notified manufacturers about the holes earlier this year.

The research, supported by the National Science Foundation and US Army Research Office, will be presented at the Network and Distributed System Security Symposium.

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1a9123e0/l/0Lnews0Btechworld0N0Csecurity0C33221960Candroid0Ephone0Emakers0Eopen0Eup0Eusers0Esecurity0Ethreats0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

The “car of the future” on agenda when car makers meet standards makers

Fully Networked CarHow international standards can support the development of "the
car of the future" and the intelligent transport systems that will support it will be among the
main items on the agenda at the next Fully Networked Car workshop.

View full post on ISO – Latest News

View full post on National Cyber Security

Gergory Evans

Malware makers migrate to ‘ce.ms’ domains after Google purge

After being thwarted by Google earlier this year, cybercriminals have shifted from “co.cc” to “ce.ms” as their preferred domains for hosting their malware.

Security firm ZScaler noticed several “ce.ms” domains were hosting malicious code, along with JavaScript code obfuscated to evade antivirus software.

“Attackers keep registering different random domains to spread their attacks, often targeting free registration services. Due to obfuscation used by the attackers, security solutions relying on regular expressions designed to match known patterns can often be evaded due to the code being spread of over numerous lines,” it said in a blog post.

Sunbelt Software noted the “ce.ms” domains indicate the host is in Montserrat, an island in the West Indies.

It noted many complaints about getting fake antivirus programs from such sites.

“Of course, not all websites using free domains are malicious, but they are popular with those looking to infect your PC so please be careful if you see a suspicious looking URL combined with a free domain or you may end up with more than you bargained for,” it advised.

Last June, Google started flagging bulk “co.cc” domains after noting many of them hosted malware.

Google said subdomains are often registered by the thousands at one time and are used to distribute malware and fake anti-virus products on the Web.

“In some cases our malware scanners have found more than 50,000 malware domains from a single bulk provider,” it said. — TJD, GMA News

Article source: http://ph.news.yahoo.com/malware-makers-migrate-ce-ms-domains-google-purge-081204695.html

View full post on National Cyber Security » Virus/Malware/Worms

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!