Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Android Security: 8 Signs Hackers Own Your Smartphone
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 4   >   >>
GerardoF416
50%
50%
GerardoF416,
User Rank: Apprentice
2/15/2015 | 2:51:10 PM
I ben hack
I, ben hack I,m 100% I,no my phone is goin crazy whit my. Maseges voiz recordin I, do not what To do can enibati heelp
Ungerone
100%
0%
Ungerone,
User Rank: Apprentice
1/28/2015 | 10:19:18 PM
Specific texts were deleted from my phone.
A friend former friend of mine had sent me several sms texts that were very self incriminating.  Not  all texts have been deleted just specific ones.  From what I have read this is not possible unless you have physical access to the phone and that is just not possible.  The only thing wierd that has happened recently was an anonymous text that I received with no text in it.  When I tried to delete it it would not delete and it was after that that I noticed that the texts had been deleted. I have tried to use a few apps and pc based programs that are able to recover deleted texts from phones but non of them work as the Galaxy Mega that I have cannot be rooted.  So my question is, is it possible to delete texts that you have sent to another phone from your phone without ever having physical control of it and since texts seem to be recoverable from a sim card is it possible that the anonymous text that I received installed something that allowed the person to pick the texts that they wanted to delete but only those texts. if any of this is possible is there a way for me to scan my phone or sim card to find out if I have been hacked?  I know that I can do a factory reset on the phones to delete anything that may have been installed but I would prefer to find out what was done to allow this.  Not to mention if the sim card has been hacked to allow this I dont want it to start all over again even after a factory reset.  Any help from out there would be greatly appreciated.

 

Thank you for your time.

Ungerone
deviclock
50%
50%
deviclock,
User Rank: Apprentice
10/24/2014 | 9:16:44 AM
Re: More security tips for the Smartphones.
 Android security is vulnerable and is easily hacked by users of the Smartphone or IT specialists. Other apps have to be downloaded to protect your data against hacking. 

my device lock
FreeTipss
50%
50%
FreeTipss,
User Rank: Apprentice
8/6/2014 | 7:44:11 PM
More security tips for the Smartphones.
That's cool. You might want to check these 10 important Smartphone security Tips too.

http://freetipss.com/smartphone-security-tips-10-useful-tips/
RoopaL731
50%
50%
RoopaL731,
User Rank: Apprentice
7/25/2014 | 6:40:19 AM
secure android mobiles
this app http://hangoverstudios.com/mobileantitheft/  which helps you find lost phone's location and picture of thief.
mrhobbes
100%
0%
mrhobbes,
User Rank: Apprentice
7/9/2014 | 9:21:59 AM
Android Security needs to be increased
Nice article on Android Security, Mathew, Great work.

 

Android is more prone to malware impacts due to Google's loose developer agreement, you can check it on my blog post regarding the same topic http://goo.gl/LyLHse you can of course, give your opinion regarding the same.  If Google increases there security measure, then surely a lot of malware and PAU's can be avoided.
anon9673719294
50%
50%
anon9673719294,
User Rank: Apprentice
6/26/2014 | 2:37:51 AM
Interesting
I recently found a useful app in Amazon that not required any unnecessary permissions and store all your passwords - MyPasswords
pnally
50%
50%
pnally,
User Rank: Apprentice
12/12/2013 | 11:52:21 AM
I'm only seeing 7 "signs"
I'm only seeing 7 "signs" listed in the article...  Was it hacked?  ;)
anon6601743669
50%
50%
anon6601743669,
User Rank: Apprentice
12/11/2013 | 9:10:33 PM
Re: MISCONCEPTION
Jailbreaking is an iOS term because Apple keeps iSheep in jail as it where with the locking down of the OS.  Rooting on the Android side is from the Linux world, which basically means you gain root access of the OS.
WayneT637
50%
50%
WayneT637,
User Rank: Apprentice
12/10/2013 | 12:47:36 AM
The Benefits of Rooting-
The first benefit of accessing administrator privileges over Android is full control over the applications installed on your handset. No longer do you have to suffer from the cluttered app drawers and reduced memory space taken up by pre-installed carrier and manufacturer applications, you can instantly cut the bloatware and keep only the apps that you really want.

Even if you're up to date with Android 4.1 or above, which grants users the ability to disable these pre-installed apps if you don't want to see or use them, you can't permanently remove them, they're still there eating up your memory space. Rooting is the only way to permanently get rid of these pesky apps, but please don't uninstall something crucial or your handset may stop working properly. Apps like Titanium Backup are particularly helpful for organising and culling this bloatware.

 

This brings me nicely on to the next major benefit of Android, improved backup and restore options. As already mentioned, Titanium Backup is one of the most popular backup apps used by rooters, and this, or a similar app, is essential if you're going to start tinkering around with Android software. But as well as acting as a safety net in case you uninstall something important, Titanium Backup can also be used to backup your user data, from SMS messages to browser bookmarks.

ClockworkMod Recovery Backup Cropped
ClockworkMod Recovery offers superior protection against faulty updates and bricking your handset.
Even better still, once rooted you can create complete backups of your entire handset using the ClockworkMod Recovery option, providing you with extra protecting in case of a major malfunction. Recovery can only be accessed before booting into Android, but it provides additional backup options in case, for whatever reason, Android fails to boot properly or experiences a crippling error. This makes ClockworkMod Recovery an essential tool for those looking to install custom versions of Android.

Once you're fully backed up you're ready to move up to one of the other major perks of rooting, installing different versions of Android.

We all know that manufacturers are often pretty slow at delivering the latest Android offerings even to their flagship handsets, let alone aging devices. So if you're not a Nexus or Play Edition device owner, rooting opens the door to much faster Android updates, thanks to the developers who put time into porting the latest updates to various handsets.

Pretty much every semi-popular handset has a decent following of developers working on porting the latest versions of Android to their handsets, most of which can be found over on the XDA Forum. The only sacrifice here is that you won't receive official manufacturer versions of Android, so no updated Touchwizz or Sense5 features, but if we were really too worried about that we probably wouldn't be rooting in the first place.

 

If stock Android isn't your thing, there are also tons of other customized ROMs offering unique features and improvements to the default Android experience.

AOSP has given us so many custom ROM's, and has extended the lifespan of many an Android.
AOSP has given us so many custom ROM's, and has extended the lifespan of many an Android handset.
I'm sure you've all heard of the biggest names, CyanogenMod, Paranoid Android, MIUI to name just a few of the most popular ones. Many custom ROMs are actually at the forefront of innovation on Android, offering several features that aren't available anywhere else. Paranoid Android's Halo feature or OmniROM's multi-workspace mode are just a couple of examples.

But as well as these big third party developments, you'll also find a lot of smaller developers tweaking away at the core Android experience, offering ROMs with vastly superior battery life or overclocked processor speeds. Not to mention that most custom ROMs are updated to the latest version of Android very quickly too, bringing you the best of both worlds.

As rooting opens up administrator type privileges on your handset you'll instantly have access to all the core files on your handset. File browser apps can take full advantage of this, allowing you to move stuff around on your internal memory if so require.

App wise, we've already touched on Titanium Backup, but there are far more apps that can make use of root permissions, and simply aren't available with a non-rooted device. The speed junkies among you could take advantage of overclocking software to boost performance or save on battery life, providing that your Kernel supports overclocking. Alternatively, fans of custom ROMs can use a ROM manager to install and update their operating system without the need to flash zip files from Recovery.

Rooting is sometimes criticized for compromising handset security, but security apps, such as Cerberus, use root functions to bury themselves deep down into the operating system, making them hard for would be thieves to remove. These apps can also be granted permissions that aren't available on unrooted devices, such as access to GPS data even when the device is locked.

There's also additional gesture apps, data syncing software, and even theme managers to customize the look of your handset.
<<   <   Page 2 / 4   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
CVE-2020-28968
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
CVE-2020-28969
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
CVE-2020-36485
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
CVE-2020-36486
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.