Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

The Android Trojan records your conversations

The Android Trojan records your conversations

SECURITY COMPANY CA TECHNOLOGIES has announced that a new Trojan has appeared for Android phones and tablets that can record phone conversations.

While the previous Trojan, which was discovered by this company, collected information on incoming and outgoing calls and their duration, this new malicious program, discovered this week, records phone conversations in .amr format and saves recordings on the device's SD card.

The program also stores a "configuration" file that contains key information about the remote server and parameters, said Dinesh Venkatesan, of CA Technologies, who probably wants to say that recorded conversations are sent to a server managed by the attacker.

Venkatesan tested the Trojan in "controlled conditions with two mobile phone emulators and a simulated internet connection" and posted screenshots of the results. It seems that the Trojan can only be installed if the owner of the Android device presses the install button in a message that looks like the installation screens of legitimate applications.

Once the malware and the configuration file for the remote server reach the Android device, every call the user receives or makes is recorded and stored on the SD card.

"Since this is the year of malware for mobile devices, we advise smartphone users to think logically and follow basic security principles while using the Internet and installing any application," Venkatesan said.

Android offers more flexibility because it allows the installation of third-party applications, including those that are not approved in the Android Market application store, but this freedom carries with it a certain risk. Malware-infected applications have also been found in the Android Market itself, although users can protect themselves by installing antivirus software, as they do with personal computers.

Text is taken from the site mikro.rs

Comments

Popular this month

Chrome crashed in Pwn2Own

Google's Chrome browser crashed during the Pwn2Own competition. Yesterday, the first of three days of the competition was held. Although Pwn2Own has been untouchable in the past two years , the French team, Vupen, was the first to show the existence of two weak points within this browser when it runs on the Windows 7 operating system.

Mobile Browsers

The Internet on mobile devices is becoming more popular and has more and more users. As mobile internet expands, so do mobile browsers. Although the devices themselves already have built-in basic internet browsers, new browsers are constantly appearing. The reason is that each of the programs brings something new and useful. For example, Opera Mini is most popular on older phone models that use Java applications, while on Android platforms Chrome , Firefox ,  Dolphin , and xScope are more represented.

Nintendo server hacked!

Problems with hackers are no longer just PlayStation 3 exclusives. Nintendo confirmed yesterday that their Nintendo America server was hacked but that no information or data was compromised during the attack.

The first Lion update

As part of a software update released yesterday, Apple released OS X 10.7.1 , the first update for their operating system that carries patches for several security vulnerabilities and bugs that accompanied the initial release.

Sony Xperia Z5 Dual Sim review [video + images]

The Xperia Z5 is another great flagship model from the Z family of devices that Sony launched in September this year, about a month ago. The case design is great . The side edges are slightly curved to make the phone fit better in the hand, and the back of the device has a fine finish so there are no glare and fingerprints.