Thứ Ba, 28 tháng 2, 2012

Unique Content Article: {tukhoaseo} {autoblog}

Android existed safety defects in equipment that can be controlled by hackers

by Jerri Lily

Computer security experts found a flaw in a component of Google's Android mobile operating system, hackers could exploit the flaw to control the Android device.

Computer security start-up companies CrowdStrike researchers said they had to figure out how to exploit this attack, the control part of the Android device. CrowdStrike said that hackers counterfeit from a reliable sender's e-mail or text message sent to the user, for example, the user of the telecommunications operators. Information requires the user to click on a link, users will be attacked. CrowdStrike co-founder, CTO Dmitri Alperovitch, at this point, the hacker complete control of the device, you can telephone tapping, surveillance equipment location.

Google spokesman Jay Nancarrow did not comment on the words of Crowdstrike.

Pavlovic said CrowdStrike purpose of this study is that the emphasis on mobile devices is a growing risk that a similar attack with a PC. In such attacks, hackers found a previously unknown defect, and then attack the use of defective link or e-mail attachments. Smartphone users need to pay close attention to mobile security software, it usually can not detect or prevent such attacks, "there will be variants and the use of different defects, such attacks can display its power in all mobile devices, mobile devices, is the largest security threats."

Attack methods discovered by CrowdStrike attack devices running Android 2.2. Google in January, the survey showed that the Android 2.2 accounted for 28% of all Android devices. Apa Pavlovic said he expects CrowdStrike next week will be developed that can attack the Android 2.3 code. Android 2.3 accounted for 59% of all Android devices.

CrowdStrike the attack code exploits a webkit browser rendering engine has not been publicly disclosed defects. Integrated in Android browser use the webkit, the webkit is also used in other software, including Google's Chrome browser and Apple iOS mobile operating system.

My name is jerri lily from custom-leather-bracelets.com, this website contains a great high quality products such as <a href="http://www.custom-leather-bracelets.com/supplier-leather_charm_bracelets-4503.html">Leather Charm Bracelets Manufacturer</a>, <a href="http://www.custom-leather-bracelets.com/supplier-custom_leather_bracelets-4418.html">China Custom Leather Bracelets</a>, welcome to visit.

---------------------------------------------------
You are receiving this because you signed up for it on 2012-01-11 from IP
To fine-tune your selection of which articles to receive, just login here:

http://www.uniquearticlewizard.com/bloggers/

using your username:

To unsubscribe please use the following link:

http://www.uniquearticlewizard.com/unsubscribe.php?mail=chiakhoaseo.thanhcong@blogger.com&code=be8dd06bc389a1220ca7344b6083f28f
---------------------------------------------------
---------------------------------
New Unique Article!

Title: Android existed safety defects in equipment that can be controlled by hackers
Author: Jerri Lily
Email: jerrilily@gmail.com
Keywords: finance,internet,business
Word Count: 302
Category: Marketing
---------------------------------

0 nhận xét:

Đăng nhận xét