You are viewing 'Android'

The Samaritan and The Smartphone

7 Tips to Secure and Help Your Cell Phone Get Home

Chad Kahl

May 26, 2015 - Posted by Chad Kahl to Security Insight

Smarphone Security

Is your phone set up to protect your data and help it find its way home when lost?

Last night, while on a walk with my amazing wife, we discovered a lost phone on the ground.

Considering that within a half-mile radius of my house there are three churches, two schools, two parks and a golf course, this happens more often than you would think. I'd like to believe that I am a decent, responsible security professional. As such, my first thought wasn't "Hmmm. What can I do with this?", but rather "How can I quickly get this back to its owner?"

Sometimes this is extremely easy. Other times, not so much. This case met a few hiccups. To respect their privacy, I always try to touch as little of their data as possible. So, here’s what I tried to do to get the phone... read more >

Smart Devices are Listening More Than Ever

Bob Bybee

February 26, 2015 - Posted by Bob Bybee to Security Insight

Your TV is Watching You

“The telescreen received and transmitted simultaneously. Any sound… above the level of a very low whisper, would be picked up by it… There was of course no way of knowing whether you were being watched at any given moment.” – Nineteen Eighty-Four by George Orwell, published in 1949

“In Russia, TV watches you!” – comedian Yakov Smirnoff, circa 1984

Be very afraid. Again.

Siri, Apple’s digital assistant program for the iPhone, once had to be explicitly activated before it would listen and accept commands. But in iOS version 8, Siri can be set to an “always listen” mode.

iPhones, iPads, Android phones and Chromebooks can now be configured to listen for an “... read more >

Android Malware

Protecting Corporate Assets from BYOD Security Risks

Michael Born

January 27, 2015 - Posted by Michael Born to Security Insight

mobile malware

I was reading a blog post about how cybercriminals are increasingly using HTML5 to sneak malware into application code, and it got me thinking.

Protecting application code from theft and reuse is becoming extremely important in mobile application security, along with guarding against the type of apps corporate end users are permitted to download and install.

As the number of mobile applications using HTML5 increase due to HTML5 cross-platform compatibility, or its platform independent nature, I envision more app developers incorporating it into their mobile app development as a time and cost saving measure. The unfortunate downside of doing so, however, is Android's lack of great binary protection mechanism.

In my previous Android blog, I explained how easy it... read more >

Mobile Device Security Tips

Nine Tips For Your Holiday Gifts

Chad Kahl

November 25, 2014 - Posted by Chad Kahl to Security Insight

mobile device security

Welcome! Welcome, one and all!

With Black Friday just around the corner, there is no doubt the holiday shopping season is upon us. For many, myself included, new phone FTW! This means a myriad of new electronic gadgets and gizmos.

Considering you are reading the Solutionary Minds blog, it stands to reason that you care about security. And because I've started setting up my new phone, it seems like a good time to discuss mobile device security.

The tips below apply primarily to phones, tablets and phablets (phones that are too big to be a normal phone and too small to be a true tablet), but many of these tips can help you protect laptops and other devices as well. The list certainly should not be considered all-inclusive, but applying it is a strong step in the right direction.

Nine Tips for Mobile Device Security

1. Enable Total-Device Encryption

Despite the ... read more >

Android Security

Unpacking Applications

Michael Born

July 17, 2014 - Posted by Michael Born to Security Insight

In my last post called, "iOS Security: Unpacking Applications," I mentioned how easy it was to get into the binary of an iOS application. In this post, we will see that it is just as easy with an Android application.

Similar to iOS applications, Android applications are compressed into a zip-like file with the extension .apk. The process for unzipping an application file is essentially the same, minus the decryption step.

First, create a folder to store the decompressed files.

mkdirApplicationName

Change directories into the newly created folder.

cd ApplicationName

Unzip the ApplicationName.apk file.

unzip /path/to/ApplicationName.apk

Once unzipped, the contents of the newly created folder should resemble the following:

 

The... read more >

1 | 2 | 3 | 4 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS