Posts Tagged ‘smartphone’

Identity theftIdentity theft has become one of the most serious problems worldwide.

According to the latest Identity Fraud Report by Javelin Strategy and Research, there were 12.6 million cases of identity theft in 2012 in the United States alone, making that 1 million victims more than in 2009.

According to the report, the common causes of identity theft include stolen wallets, familiar fraud (victim knows the fraudster – can be a close friend or relative), online phishing scams and vicious computer viruses such as malwares and spywares,

You may think that identity theft couldn’t happen to you because you are careful with whom you give your important and personal details to. However, identity thieves are also getting smarter by the day about how to get your information. Here are the top 5 people at risk of identity theft, the reasons behind it, and how they can prevent it. (more…)


Vulnerabilities in Smartphone Pentest

Vulnerability: Multiple vulnerabilities in Smartphone Pentest Framework (SPF)

Danger: High
Number of vulnerabilities: 5

– CVE-2012-5697;
– CVE-2012-5694;
– CVE-2012-5693;
– CVE-2012-5695;
– CVE-2012-5696.

Vector operation: Local Network (LAN)
Impact: Cross Site Scripting, Unauthorized manipulation of data, Elevation of Privilege, Security Bypass, System compromise

Affected Products: Smartphone Pentest Framework (SPF) 1.x

Affected versions: Smartphone Pentest Framework (SPF) 1.0 (more…)


Vulnerability in the Wi-Fi modules

In the two non-wireless Internet access production Broadcom found serious flaw that can cause denial of service.

Researchers CoreSecurity Andres Blanco discovered a serious vulnerability in two Wi-Fi-module, which provides wireless access to the Internet, which are installed in a number of modern smartphones.

According to Blanco, chips made by Broadcom Corporation contain unterminated hole that attackers can use to carry out DoS-attacks.

In the study, Blanco found the vulnerability CVE-2012-2619 is present in the chipset BCM4325 and BCM4329 and allows a remote user to DoS-attack, using the read error beyond the borders of the data.

According to experts, the affected products Broadcom BCM4325 completed a number of modern gadgets production of various companies, including Apple iPhone 3GS, Apple iPod 2G, HTC Touch Pro 2, HTC Droid Incredible, Samsung Spica, Acer Liquid, Motorola Devour, and the car Ford Edge. (more…)

FBIWarning the U.S. government provides tips on protecting mobile devices based on Android.

Due to the significant increase in the number of malicious programs for mobile platforms, the U.S. government has found it necessary to make sure that users are aware of the dangers posed by viruses.

Thus, the State Interagency Management Internet Crime Complaint Center (IC3), which includes the FBI issued a notice informing you of malicious mobile applications.

“Experts IC3 were informed of the programs that attack the operating system Android, – follows from the notice. – Some of the latest variations of the virus is – Loozfon and FinFisher. (more…)