You are viewing 'Android'
7 Tips to Secure and Help Your Cell Phone Get Home
Is your phone set up to protect your data and help it find its way home when lost?
Last night, while on a walk with my amazing wife, we discovered a lost phone on the ground.
Considering that within a half-mile radius of my house there are three churches, two schools, two parks and a golf course, this happens more often than you would think. I'd like to believe that I am a decent, responsible security professional. As such, my first thought wasn't "Hmmm. What can I do with this?", but rather "How can I quickly get this back to its owner?"
Sometimes this is extremely easy. Other times, not so much. This case met a few hiccups. To respect their privacy, I always try to touch as little of their data as possible. So, here’s what I tried to do to get the phone... read more >
“The telescreen received and transmitted simultaneously. Any sound… above the level of a very low whisper, would be picked up by it… There was of course no way of knowing whether you were being watched at any given moment.” – Nineteen Eighty-Four by George Orwell, published in 1949
“In Russia, TV watches you!” – comedian Yakov Smirnoff, circa 1984
Be very afraid. Again.
Siri, Apple’s digital assistant program for the iPhone, once had to be explicitly activated before it would listen and accept commands. But in iOS version 8, Siri can be set to an “always listen” mode.
iPhones, iPads, Android phones and Chromebooks can now be configured to listen for an “... read more >
Protecting Corporate Assets from BYOD Security Risks
I was reading a blog post about how cybercriminals are increasingly using HTML5 to sneak malware into application code, and it got me thinking.
Protecting application code from theft and reuse is becoming extremely important in mobile application security, along with guarding against the type of apps corporate end users are permitted to download and install.
As the number of mobile applications using HTML5 increase due to HTML5 cross-platform compatibility, or its platform independent nature, I envision more app developers incorporating it into their mobile app development as a time and cost saving measure. The unfortunate downside of doing so, however, is Android's lack of great binary protection mechanism.
Nine Tips For Your Holiday Gifts
Welcome! Welcome, one and all!
With Black Friday just around the corner, there is no doubt the holiday shopping season is upon us. For many, myself included, new phone FTW! This means a myriad of new electronic gadgets and gizmos.
Considering you are reading the Solutionary Minds blog, it stands to reason that you care about security. And because I've started setting up my new phone, it seems like a good time to discuss mobile device security.
The tips below apply primarily to phones, tablets and phablets (phones that are too big to be a normal phone and too small to be a true tablet), but many of these tips can help you protect laptops and other devices as well. The list certainly should not be considered all-inclusive, but applying it is a strong step in the right direction.
Nine Tips for Mobile Device Security
1. Enable Total-Device Encryption
Despite the ... read more >
In my last post called, "iOS Security: Unpacking Applications," I mentioned how easy it was to get into the binary of an iOS application. In this post, we will see that it is just as easy with an Android application.
Similar to iOS applications, Android applications are compressed into a zip-like file with the extension .apk. The process for unzipping an application file is essentially the same, minus the decryption step.
First, create a folder to store the decompressed files.
Change directories into the newly created folder.
Unzip the ApplicationName.apk file.
Once unzipped, the contents of the newly created folder should resemble the following:
The... read more >