BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘android’

img-mobile

Most Versions of Android have SMiShing Vulnerability

Researchers at NC State University have discovered a vulnerability that allows a zero-permission App to fake SMS messages and thus lead to potential SMS Phishing (or SMiShing).   By creating fake SMS messages from legitimate looking sources, a mal-ware app could fool a user into clicking on a link to a rogue site with the intension of…

Post by Bobby DeSimone and Scott Ellis November 5, 2012
Tags:
, , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
android4_skate

How important is Android 4 to BYOD?

Android 4 (so far dubbed Ice Cream Sandwich for 4.0.x or Jelly Bean for 4.1.x) is a significant upgrade to the user experience adding in many refinement and features.  For enterprises dealing with the Bring Your Own Device (BYOD) movement, some of these upgrades can be a double-edged sword.

Post by Scott Ellis September 19, 2012
Tags:
, , , , , ,
new-kids-on-the-block

Create custom audits for Android devices. Come on, all the cool kids are doing it.

Have you ever wanted to root your Android device, so you could be like all the other cool kids on the block? If you did your research, you learned that it makes it easier for attackers to keep their malware on your device, if it were to be infected, through the use of a rootkit….

Post by Carter Jones July 18, 2012
Tags:
, , , , , ,
img-android

Off the beaten Google Market

There have been a number of recent articles and blog posts around Android devices infected with various malware and malicious apps.  One recent nasty piece of malware found in many Chinese Android app stores is ‘Trojan!MMarketPay.A@Android’.   The interesting feature of this malware is that it can run up an unsuspecting user’s cell phone bill by…

Post by Jerome Diggs July 10, 2012
Tags:
, , , , , , , ,
google-bouncer

Google’s Bouncer Gets Roughed Up; Why You Should Care

With the increasing number of devices and applications in the enterprise, driven by the “consumerization of IT” and Bring Your Own Device (BYOD), companies are faced with the need for visibility as to what risk is being introduced to the enterprise. One might think this is a challenge the handset or mobile platform vendors are…

Post by Jerome Diggs June 28, 2012
Tags:
, , , , , ,
CustomAuditsAndroid1-680x607

Retina Now Offers Custom Audits for Android Devices

When a marketing buzz word sticks like BYOD (Bring Your Own Device), it is inevitable to see it everywhere in an effort to capitalize on the momentum; blogs, literature, SEO, social media, etc. In the past, we have seen great terms like “ecosystem”, “framework”, and my personal favorite “distributed computing”, rise and fall in marketing….

Post by Morey Haber May 16, 2012
Tags:
, , , , ,
img-64

Samsung Mobile Devices Vulnerable to Website Wipe

According to IBTimes, Samsung, one of the leaders in manufacturing Android devices, has a very serious bug in their TouchWiz implementation of Android. Samsung, like most manufacturers, modifies the stock Android image to add in its own modifications and enhancements.

Post by Peter McCalister October 16, 2011
Tags:
, , ,
img-android

Android Handset Makers – Adding Value or Vulnerabilities?

So many things in life can cause perception to over take reality and one great example of that is as it relates to Google’s Android security. Android itself is a very robust and security minded operating system backed by one of the best security research teams in the business. One of the big things that…

Post by The eEye Research Team October 10, 2011
Tags:
, ,