Security researchers said several HTC Android phones, including Evo 3D, Evo 4g, and Thunderbolt, contain security vulnerabilities, other applications that can automatically connect to the Internet may read personal data, including text messages, local information, emails, and phone numbers.
Three security researchers, including Artem Russakovskii, Justin Case, a
Security researchers have proposed a new method to attack mobile phones in seconds.
Recently, two security researchers have proposed a new method to attack smartphones in seconds.Costs about $300Kai Cao and Anil K. Jain from the College of Computer Science and Engineering at Michigan State University can crack smart machines in 15 minutes or less. This method can
This article was intended to be written since very early last year and has never been available. It was just a short time when a salon talked about such things.
In the past, security enthusiasts often studied local app security, such as remote control, app cracking, and information theft. Most people have not noticed the security issues on the app server, as a r
AES key in the malware , but this requires some technical capability. One months ago, another Android malware reported by researchers could disable a user's phone and ask the user to pay a ransom for it. 8 months ago, a malware called Cryptolocker could permanently lock a PC 's hard drive unless the victim paid 300 USD fee. The app is not listed on the Google Play store, and is spread primarily through other channels. As a result,Android users should be cautious before choosing to install ap
attacking a high-privileged system_server process, allowing the privilege to be elevated to the level of the system user, which has a relatively loose SELinux configuration, resulting in increased damage behavior. For example, an attacker could take over any app on the victim's phone by replacing the target app's apk. This allows an attacker to perform operations as a victim. In addition, we can use the Android Keychain app to run Shell commands to steal data from all apps in the device. You ca
How to perform security analysis on unknown apps on mobile phones
Mobile Anti-Virus Software mostly uses signatures to determine the virus. It cannot be prevented before the virus is intercepted. However, the anti-virus software on the PC end has a file analyzer function. How can we analyze the security of unknown app
IOS security analysis on the mobile cloud storage service platform (Parse)
Parse: A cloud platform that provides background services for mobile appsParse is a cloud computing platform incubated by YC to provide background services for mobile applications. It provides tedious background services for developers so that d
We do the site, the user experience that is very important, such as 12306 Rob tickets need to fill in the ID card, if not the space, dense to give me a very depressing feeling, and also not easy to check whether the information is filled out correctly, so I wrote a use JS implementation of the completion of the social security number, mobile phone number, The effect of automatic space for information such a
Android project: Mobile Security Guard (16)-complex ListView AnalysisAndroid project: Mobile Security Guard (16)-Introduction to complicated ListView1
Next, the content of yesterday will continue to improve the Application List today. First, applications are divided into system applications and user applications. The i
experience, the introduction of application hardening solutions, can be used to do security hardening and vulnerability detection services, encryption method is simple and fast, effectively help developers to protect software copyright and revenue.NetEase Cloud encryption through the Dex files, resource files, so library files and game app scripts and dynamic library files to protect the static crack and dynamic crack shut out, can prevent the applic
[Learn Android while working on a project] mobile security guard 03: gets the updated server configuration, displays the update dialog box, and learns androidConfigure the name and icon of the application displayed on the mobile desktop-AndroidManifest. xml:
After configuration
① ②Obtain the updated server configuration process:
Server Configuration:
Use tomcat a
In 2013, the scale and revenue of the hand tour industry have achieved substantial growth and strong development momentum. However, in the rapid development of hand-tour at the same time, due to regulatory, audit and other aspects of loopholes, mobile phone game software is cracked after injecting malicious code, theft of user property, theft of user equipment information is not uncommon. Hand Tour is cracked after the hacker's various malicious behav
An open-source mobile security testing framework-MobSF
The Mobile Security Framework (MobSF) is an intelligent and integrated automatic testing framework for open-source mobile apps (Android/iOS, able to perform static and dynamic analysis on the above two
Handheld mobile devices, mainly PDA and mobile phones (bullet injection)
1. Sensitive data stored on handheld mobile devices includes:
L enterprise data
L bank account
L social welfare information
L tax data
L business data
L personal name and address
L plaintext personal password
2. 40% of handheld mobile
loss. For the APK has been tampered with the problem of re-packaging, you can choose to use the APK reinforcement products to secure the APK to enhance the security capabilities of the application, to improve the difficulty of the apk is malicious hack.The cloud encryption is the NetEase security team combines many years of security experience, the introduction
HTTPS bidirectional authentication to build mobile device security systemFor enterprise projects with high security requirements, we sometimes want to be able to authenticate clients. At this point we can use the two-way authentication mechanism of HTTPS to implement this function.One-way authentication: Ensure that the server is true and that the channel is secu
login:.To summarize:In the process of transferring trust information from a high trust domain to a low trust domain, the non-reversible hash encryption process can effectively control the high trust level of information that spreads directly to the lower trusting domain. Suppose there are multiple levels of such a scenario in a system. That should be done more than once using irreversible encryption.Note:1) The above mentioned one irreversible cryptographic processing does not mean that it can
matching query database, if not match query another database (such as 110, 10086, landline, etc.);Regular expressions for mobile numbers:1 number.matches ("^1[345678]\\d{9}$")View Code3, through the number startswith (String prefix) method to determine whether the number starts with "0", if set up the first 4-digit intercept number of the query Data2 area to obtain the place of attribution, and then the place of attribution of the last two (telecommu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.