OS

Trojan captures Android.Spy.40.origin Android-smartphones

Domestic company “Doctor Web” reported an outbreak of a new Trojan Android.Spy.40.origin, designed for OS Google Android. So far, he’s seen only in South Korea, but it is unlikely he will be based in this country and beyond. Trojan Android.Spy.40.origin can leak on a smartphone is completely transparent, and even anti-virus system will not sound(…)

How to turn Android-powered device into a tool for pentesting?

The market of mobile phones and tablet computers flooded the millions of devices running Android. Sometimes I wonder, how could Ken Thompson and Dennis Ritchie imagined that their creation, which is about 44 years old, will affect the core of Linux, Google, Apple and so on. Now we are surrounded by a sea of devices(…)

10 Apps to Secure Your iPhone

As long as Apple did not provide a full-featured antivirus for iPhone, there are several points to be taken by each user IPhone to protect your device. A great variety of other functionality, such as password management, or the introduction of additional protection for sensitive files, implemented in the applications of third parties. Given the(…)

Linux kernel has a bug that disables USB-devices

One of the developers of the Linux kernel Sarah Sharpe at Intel sprinkles ashes on his head : for the eight years of work on Linux USB stack are repeatedly confronted with a situation where USB-device is suddenly disconnected after leaving the standby mode activated auto-Suspend . All the while, the problem ascribed to Chinese(…)

Code for spoofing APK preserving digital signatures on Android-powered devices

A few days ago, the company Bluebox Security announced that at the Black Hat USA 2013 conference, which begins July 27, 2013, they will talk about the enchanting vulnerability in the security model of the operating system Android, which allows an attacker to modify the contents of the APK file, without changing the cryptographic signature. In other words, any(…)

The new 0day-vulnerability in Linux 2.6.37 – 3.8.8

A few days ago an exploit ready was published, which carries an escalation of privileges in Linux 2.6.37 – 3.8.8. The code shown on the link, anyone can compile and run on your system, checking its operation. If it does not work, it’s not a reason to calm: it may just need a more qualitative exploit. Detailed explanation of(…)

Windows 8 Update is changing course to 180 degrees

Microsoft is preparing a release of an updated version of Windows 8.1 with a change of the “key elements” of the operating system. This was said by the head of marketing and finance of Windows Tami Reller in an interview with Financial Times . She explained that refers to the “key aspects” of how to(…)

Debian 7.0 Wheezy with multiarchitecture and installation in blind mode

After two more years of development, the Debian Project has finally issued the release its next major stable release of the popular operating system Debian 7.0 (code-named “Wheezy”). The new version has some interesting features, such as support multiarchitecture and special tools for deploying private clouds . Multiarchitecture means that users can be installed on(…)

Microsoft introduced a fix to update MS13-036

Microsoft has released an update for computers affected by the detected error in one of the security bulletins that were released last week. For example, the company introduced the users to boot the image file used to create the backup DVD or USB-disk, which can remove security updates automatically. The image format ISO, supported by(…)

Windows 8 will get back “Start” menu

New comprehensive update to Windows 8/RT, Windows Server 2012, Windows Phone 8 and cloud Outlook.com called SkyDrive Windows Blue appears in the middle of this year. One of the purposes of this update is to optimize the work and the interest of the users of the operating system from Microsoft. As requested by users of(…)