Redian新闻
>
海归的两个选择,很艰难
avatar
海归的两个选择,很艰难# Biology - 生物学
c*o
1
Summary: "For now, Android is the Wild West."
By Jim Finkle
LAS VEGAS (Reuters) - Hacking experts have demonstrated ways to attack
Android smartphones using methods they said work on virtually all such
devices in use today, despite recent efforts by search engine giant Google
to boost protection.
Experts showed off their prowess at the Black Hat hacking conference in Las
Vegas, where some 6,500 corporate and government security technology workers
gathered to learn about emerging threats to their networks.
"Google is making progress, but the authors of malicious software are moving
forward," said Sean Schulte of Trustwave's SpiderLabs.
Google spokeswoman Gina Scigliano declined to comment on the security
concerns or the new research.
Accuvant researcher Charlie Miller demonstrated a method for delivering
malicious code to Android phones using a new Android feature known as near
field communications.
"I can take over your phone," Miller said.
Near field communications allow users to share photos with friends, make
payments or exchange other data by bringing Android phones within a few
centimeters of similarly equipped devices such as another phone or a payment
terminal.
Miller said he figured out how to create a device the size of a postage
stamp that could be stuck in an inconspicuous place such as near a cash
register at a restaurant. When an Android user walks by, the phone would get
infected, said Miller.
He spent five years as a global network exploit analyst at the U.S. National
Security Agency, where his tasks included breaking into foreign computer
systems.
"WILD WEST"
Miller and another hacking expert, Georg Wicherski of CrowdStrike, have also
infected an Android phone with a piece of malicious code that Wicherski
unveiled in February.
That piece of software exploits a security flaw in the Android browser that
was publicly disclosed by Google's Chrome browser development team,
according to Wicherski.
Google has fixed the flaw in Chrome, which is frequently updated, so that
most users are now protected, he said.
But Wicherski said Android users are still vulnerable because carriers and
device manufacturers have not pushed those fixes or patches out to users.
Marc Maiffret, chief technology officer of the security firm BeyondTrust,
said: "Google has added some great security features, but nobody has them."
Experts say iPhones and iPads don't face the same problem because Apple has
been able to get carriers to push out security updates fairly quickly after
they are released.
Two Trustwave researchers told attendees about a technique they discovered
for evading Google's "Bouncer" technology for identifying malicious programs
in its Google Play Store.
They created a text-message blocking application that uses a legitimate
programming tool known as java script bridge. Java script bridge lets
developers remotely add new features to a program without using the normal
Android update process.
Companies including Facebook and LinkedIn use java script bridge for
legitimate purposes, according to Trustwave, but it could also be exploited
maliciously.
To prove their point, they loaded malicious code onto one of their phones
and remotely gained control of the browser. Once they did that, they could
force it to download more code and grant them total control.
"Hopefully Google can solve the problem quickly," said Nicholas Percoco,
senior vice president of Trustwave's SpiderLabs. "For now, Android is the
Wild West."
avatar
S*g
2
一个是大千老计划,top3大学
一个是百老计划,中科院生殖所
请大家帮我分析一下
avatar
d*y
3
向king博士致敬
avatar
K*S
4
你肯定是生殖所啊,必须的.

【在 S*********g 的大作中提到】
: 一个是大千老计划,top3大学
: 一个是百老计划,中科院生殖所
: 请大家帮我分析一下

avatar
s*y
5
为什么不去应聘大老千计划啊?

【在 S*********g 的大作中提到】
: 一个是大千老计划,top3大学
: 一个是百老计划,中科院生殖所
: 请大家帮我分析一下

avatar
n*c
6
坑王你还是去生殖所吧,带上你的东欧情人老板。
avatar
s*n
7
avatar
t*a
8
top3大学二B学院大千老.

【在 S*********g 的大作中提到】
: 一个是大千老计划,top3大学
: 一个是百老计划,中科院生殖所
: 请大家帮我分析一下

相关阅读
logo
联系我们隐私协议©2024 redian.news
Redian新闻
Redian.news刊载任何文章,不代表同意其说法或描述,仅为提供更多信息,也不构成任何建议。文章信息的合法性及真实性由其作者负责,与Redian.news及其运营公司无关。欢迎投稿,如发现稿件侵权,或作者不愿在本网发表文章,请版权拥有者通知本网处理。