If You Have An Android Phone, Read This
Adrian Kingsley-Hughes has posted an article that all smart phone owners should be aware of, and Android owners should read very carefully. It contains a list of apps that have been poisoned to “root” your phone and steal all your info.. and maybe do more than that. Worse (scarier), these apps are on the app Marketplace. And, I may have downloaded one.
Stolen apps that root Android, steal data and open backdoors available for download from Google Market
“To many of its fans, the openness and freedoms offered by the Android mobile operating systems is one of its main selling points. But that openness come with a price – it makes it easy for nefarious types to sneak malware into apps. And that’s exactly what they are doing.”
I am going to provide his list of infected apps, but just because you don’t see one you recognize as having installed doesn’t mean you should skip reading his article (click here to read it). It contains info we all should know.
|
|
|
Toward the bottom of his article is a link to another of his articles, which describes what you need to know to keep your phone safer.
Again, this is important enough that I am asking you to read the article (click here to read it) and forward it to all your friends and family who own smart phones. Android, and Google’s app Marketplace are not the only targets of the cybercriminals. Apple’s store is no better off, and they do not vet their apps for malware.
Makes me glad I haven’t used my phone to check my balance…
Related: Study: Cybercrime cost firms $1 trillion globally (that would be in 2010..)
Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing the damage last year, according to a new study from McAfee.
Make no mistake: the Evil Doers are going after all Internet-connected devices.
It’s a brave new world.
How nice. Someone is trying to send me a free computer. I like free computers.
Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
Video: To Catch An ID Thief*
“When you think of the Internet underground, you probably don’t think about Burbank or Ventura, Calif.. But if you want to see what’s going on in the Web’s darkest corners, the Ventura Freeway is where you need to go…”
I have been a fan of Bob Sullivan’s MSNBC Red Tape Chronicles for a while now, and recently I had the time to go through some of his older articles, and I came across one I had missed — A Portal On Credit Card Crime.
I highly recommend that you read this article.
On it, I also found links to a Dateline special undercover series titled “To Catch an ID Thief”, which I had also missed. It too, is a “must read”, er.. “must see”. So I have provided links to the videos. (You will need to enable Flash.)
Amazing stuff here. I hope you’ll watch and learn, and tell your friends.
3: ‘Hansen Discount Electronics’
Today’s free link: Free Lifetime License for SUPERAntiSpyware Professional – 20 to Give Away
Today’s free download: If you are considering building your own website, or are interested in free WYSIWYG web-authoring tools, a nice tool is the free version of Web Easy Professional, by V-Comm.
*Orig post: 5/8/09
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Cybercriminals Target Clueless Vacationers
“This guy doesn’t know it, but he’s putty in the hands of cybercriminals. The newest trend in Internet fraud is “vacation hacking,” a sinister sort of tourist trap.
Cybercriminals are targeting travelers by creating phony Wi-Fi hot spots in airports, in hotels, and even aboard airliners.
Vacationers on their way to fun in the sun, or already there, think they’re using designated Wi-Fi access points. But instead, they’re signing on to fraudulent networks and hand-delivering everything on their laptops to the crooks*.”
Please click here to read the rest of this story, and find out what you need to know before you use public “hotspots”.
* emphasis mine.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
A Thieves Market — The Internet
“When you think of the Internet underground, you probably don’t think about Burbank or Ventura, Calif.. But if you want to see what’s going on in the Web’s darkest corners, the Ventura Freeway is where you need to go…”
I have been a fan of Bob Sullivan’s MSNBC Red Tape Chronicles for a while now, and recently I had the time to go through some of his older articles, and I came across one I had missed — A Portal On Credit Card Crime.
I highly recommend that you read this article.
On it, I also found links to a Dateline special undercover series titled “To Catch an ID Thief”, which I had also missed. It too, is a “must read”, er.. “must see”. So I have provided links to the videos. (You will need to enable Flash.)
Amazing stuff here. I hope you’ll watch and learn, and tell your friends.
3: ‘Hansen Discount Electronics’
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Hacker Theft Could be the Largest Credit Card Crime in History
Hackers breach Heartland Payment credit card system
Heartland Payment Systems hpy on Tuesday disclosed that intruders hacked into the computers it uses to process 100 million payment card transactions per month for 175,000 merchants. The number of victims is still unknown.
Heartland’s disclosure coincides with reports of heightened criminal activities involving stolen payment card numbers. Security firm CardCops has been tracking a 20% year-over-year increase in Internet chat room activity where hackers test batches of payment card numbers to make sure that they’re active.
To read the full news story, click here.
My two cents: This is why, folks, you don’t want to get all excited about “cloud computing”, or allow your governments to create large “databases”.. like a “national health registry”, or “crime database”.. and why I don’t use “online backup” to store my files.
Why trust someone else’s server? The Conficker outbreak shows you how well servers get patched..
I feel bad for the folks at HPS.. the cost to “clean this up” is going to be astounding.. For more on that see, Credit card hackers find new, rich targets.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Interview with an ID thief
This CNN special report interviews spammer Jason Carpenter. Though it is dated, it is interesting.