Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

The Android Trojan records your conversations

The Android Trojan records your conversations

SECURITY COMPANY CA TECHNOLOGIES has announced that a new Trojan has appeared for Android phones and tablets that can record phone conversations.

While the previous Trojan, which was discovered by this company, collected information on incoming and outgoing calls and their duration, this new malicious program, discovered this week, records phone conversations in .amr format and saves recordings on the device's SD card.

The program also stores a "configuration" file that contains key information about the remote server and parameters, said Dinesh Venkatesan, of CA Technologies, who probably wants to say that recorded conversations are sent to a server managed by the attacker.

Venkatesan tested the Trojan in "controlled conditions with two mobile phone emulators and a simulated internet connection" and posted screenshots of the results. It seems that the Trojan can only be installed if the owner of the Android device presses the install button in a message that looks like the installation screens of legitimate applications.

Once the malware and the configuration file for the remote server reach the Android device, every call the user receives or makes is recorded and stored on the SD card.

"Since this is the year of malware for mobile devices, we advise smartphone users to think logically and follow basic security principles while using the Internet and installing any application," Venkatesan said.

Android offers more flexibility because it allows the installation of third-party applications, including those that are not approved in the Android Market application store, but this freedom carries with it a certain risk. Malware-infected applications have also been found in the Android Market itself, although users can protect themselves by installing antivirus software, as they do with personal computers.

Text is taken from the site mikro.rs

Comments

Popular this month

Google offline maps - instructions

Google has recently added several new features to its maps, including Offline maps and turn-by-turn navigation. It was these two options that were missing so that Google Maps  that could be used as a standalone offline navigation app.

Make your phone "transparent"!

It's actually one app for Android devices. Transparent Screen is one useful application that will use the camera on your Android device to display everything that the camera captures on the screen, so you have the feeling that the phone is transparent.

SOPA is retiring for now

Lamar Smith said he is withdrawing the controversial SOPA law for now until they find a solution. Namely, the people behind this have obviously taken the protests of Wikipedia , Google, Reddit, and other big companies around the world seriously.

SIM card sizes (Mini, Micro, Nano) - explanation

Many users still complain about the size of SIM (subscriber identification module) cards. Which one goes on the phone? Can it be shortened? Can a smaller one into a larger slot? Although we are slowly switching to eSIM (more on this in this article ), we still use classic SIM cards. Newer phones usually require a Nano sizes, but operators issue SIM cards in all sizes. More precisely, now SIM cards are made so that the user can choose the size immediately, and later change it if necessary. More on that at the end of the article.

What should you check before buying a used phone?

If you buy a used phone from an unknown person, or even from a known person, you must always check the phone for any damage - visible or hidden. But what all needs to be checked? How? That is exactly what I am writing in this article!