Tag Archive | "hackers"

android malware google

Tags: , ,

Million of Android Devices would be Infected by Malwares

Posted on 04 February 2015 by @patlalrique

 

android malware 5

 

The explosion of mobile devices in circulation in the last decade brought along its lot of virus and malware. Android, being in part open source and adopted by many phone makers, has become an attractive targets for hackers, spammers and crackers.
 

The popular mobile operating system from Google has now a new problem: applications in the Google Play Store that pose as legitimate apps but are vehicule for spamming and hacking. The issue is that these softwares ability to conceil themselves in the store as good apps and subsequently slip through Google quality control screening.
 

android malware google
Avast broke the news yesterday and published an article. Avast would have alerted Google, saying that one of the identified problematic app could have been downloaded between 5 and 10 million times.
 

The guilty app Durak, looked like it was a perfectly normal app. But after a reboot and a couple days wait, you could tell there was something wrong with your phone. Some apps could wait 30 days before showing their true colors. This is classical trick, and the user can very well forget about the app, so it become harder to be identified and removed.
 

One of the interesting questions coming with that story is why doing creating these apps and breaching trust?
 

Because the internet has become a race to get traffic or users. Most mobile application usage are from the big boys like Facebook, Apple, Google and so on. A tiny fraction of user attention (really, that’s the currency we are talking here) is left to be shared with the rest of the studios and software companies. Some could be tempted to use that scheme for financial gain.
 

Thus it’s not surprising to see that type of software designed to spam and collect data emerging. What is surprising is that they were allowed to reach the million downloads.

Comments (0)

syrian rebel allepo 2012

Tags: ,

Syrian rebels dumbly fall for hackers impersonating hot chicks and get cracked honeypot style

Posted on 03 February 2015 by @patlalrique

 

syrian rebels allepo iphone

 

Internet has always been a place where you don’t neccessarily know who you talking to; in fact, most of the time you talk with people you don’t know (and even then) you don’t have any guarantee that they really are who they say they are. The [inlinetweet prefix=”@patlalrique” tweeter=”RT @nwopad” suffix=””]Syrian rebels learned it the hard way: pro-Assad hackers succeeded at stealing crucial data from their phones and computers by using a catfishing method[/inlinetweet].
 

Hackers opened account on Skype, Facebook and other social media and put pictures of very attractive female to profile picture. After contact initiated, small talk in chat occured between hacker and target. After winning confidence of targets, hackers asked to exchange pictures.
 

The hackers sent infected files to the targets who then installed malwares on their systems by opening them. The hackers had subsequently access to all files and were free to copy or download them, which they did, for a amount of 7.7 gigs from roughly 12 500 contacts in 8 countries.
 

Comments (0)

Tags: , , ,

Deep Web or Dark Web?

Posted on 30 April 2014 by @patlalrique

 
 
deep web dark web iceberg
 
 
The Internet is a large place, so logically some areas are less visible than others, just like an highway bridge is a very frequented place and that underneath it is visited by very few people.
 
 
Some argue that the Deep Web is mostly information already available to the public, but what it is exactly? The most mentioned aspect of the Deep Web is that it contains information not indexed by search engines. Some are more specific and say it must also be protected by a password.
 
 
deep web dark web shallow
 
 
What about unsecured information available when it shouldn’t be? We can add to information available on websites that rank very low on Google and other SE. After all, what good is indexed information when you can’t see it through the giant melting pot that is the Internet. But the information available on the Deep Web is generally speaking what cannot be found by search engines.
 
 
Another thing we see in tech media is the tendency to assimilate the Deep Web with the Dark Web. Effectively, they often talk about both and confounding them with each-others.
 
 
In reality, the big difference is the Dark Web is intentionally hidden, and that you need a specific set of application to access it. The Dark Web would be a small part of the overall Deep Web.
 
 
This is a very superficial recap. Others describe pretty well what the Dark Web and Deep Web contain exactly elsewhere on the Internet. More general info here.
 
 

Comments (0)