Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

The Android Trojan records your conversations

The Android Trojan records your conversations

SECURITY COMPANY CA TECHNOLOGIES has announced that a new Trojan has appeared for Android phones and tablets that can record phone conversations.

While the previous Trojan, which was discovered by this company, collected information on incoming and outgoing calls and their duration, this new malicious program, discovered this week, records phone conversations in .amr format and saves recordings on the device's SD card.

The program also stores a "configuration" file that contains key information about the remote server and parameters, said Dinesh Venkatesan, of CA Technologies, who probably wants to say that recorded conversations are sent to a server managed by the attacker.

Venkatesan tested the Trojan in "controlled conditions with two mobile phone emulators and a simulated internet connection" and posted screenshots of the results. It seems that the Trojan can only be installed if the owner of the Android device presses the install button in a message that looks like the installation screens of legitimate applications.

Once the malware and the configuration file for the remote server reach the Android device, every call the user receives or makes is recorded and stored on the SD card.

"Since this is the year of malware for mobile devices, we advise smartphone users to think logically and follow basic security principles while using the Internet and installing any application," Venkatesan said.

Android offers more flexibility because it allows the installation of third-party applications, including those that are not approved in the Android Market application store, but this freedom carries with it a certain risk. Malware-infected applications have also been found in the Android Market itself, although users can protect themselves by installing antivirus software, as they do with personal computers.

Text is taken from the site mikro.rs

Comments

Popular this month

Check if your computer is male or female

One small and interesting trick you can use to check whether your computer is male or female. All you have to do is an open notepad and copy the following script: CreateObject("SAPI.SpVoice").Speak"Am I male or female" (I recommend copying it from THIS link)

How to hack WiFi using Android device

" How to hack wifi " - is one of the common questions I get, so I decided to present here some Android applications that can help with that. Let me immediately mention: in this text, you will not learn how to hack a WiFi password, but how to hack other users on that network. If you still want to hack your WiFi password, look for instructions HERE .

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

"Revive" ancestral photos with this free app

If a picture is worth a thousand words, how much is a video worth? So if the video lasts 10 seconds then it is worth 300,000 words considering that the video has 30 FPS. Now imagine having a video of your ancestor? You'd love it, wouldn't you? Well, if you have a picture of that person, you can make a video from just that one picture!