android

Every Wi-Fi enabled device vulnerable to a new security attack called KRACK

Security researchers have discovered weaknesses in the WPA2 (Wi-Fi Protected Access II), the security protocol for most modern Wi-Fi networks. An attacker within the range of victim can interrupt credit card numbers, passwords, photos, and other sensible information using the bug called KRACK (Key Reinstallation Attacks). What this means is that the security built into Wi-Fi is likely ineffective, and we should not assume it provides any security. If the security problem which researchers have discovered is true, then it will be very difficult to fix it. Because the WPA2 is built into almost every internet connected device. During the initial research, it was found that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others are all affected by some variant of attacks. The a...

GitHub introduces new code security and collaboration features for developers

At GitHub Universe conference in San Francisco, GitHub announced a number of new tools that leverage its community data to protect code, provide greater security, improve ways of collaboration and enhance the developer experience. GitHub had begun its journey almost ten years ago as a platform that brings together the developer community around the globe. Now that the millions of developers worldwide use its platform for various purposes, the company shared its future plans to expand the ecosystem and transform the way developers code through new tools and data. Dependency Graph The new dependency graph lets developers manage complexity of dependencies in their code. Developers can now keep track of their packages and applications easily without leaving their repository. Dependency graph c...

XO Communications Launches XO Enterprise Cloud, XO Cloud Drive and XO Cloud Vault

 XO Communications today announced launch of  XO Enterprise Cloud, XO Cloud Drive, and XO Cloud Vault, its three new cloud service offerings that leverage  Tier III data centers and the XO nationwide network to offer IT infrastructure-as-a-services ideal for SMBs and enterprises who want to to virtualize their data centers, back up enterprise-wide data to the cloud, and enable cloud-based file sharing and storage for employees. Providing SLAs, integrated security, and high-performance data center and network, the new enterprise-class cloud solutions help IT professionals and the organizations run a wide range of applications, from test and development to mission-critical applications, in the cloud. XO Enterprise Cloud Designed to meet customer requirements for enterprise-grade cloud comput...

Are you updating Google Play Store? STOP!

TrustGo, a mobile security company, recently reported that a new malware named FakeLookout.A has been discovered on Google Play. According to TrustGo blog post, this malware hides itself in the full Application List after installation. It only shows up in the Downloaded app list where it uses Lookout’s icon and the name “Updates”. It can receive and execute commands from remote server. According to remote server’s commands, the malware can steal user’s SMS messages and MMS messages and upload them to remote server via secure FTP. It also uploads the complete file list from the user’s SD card to the remote server. Then remote server controls the malware to upload specific files. “The brazen use of a trusted app’s logo shows just how aggressive malware makers are becoming. These ...

Aakash-2 now at an increased price

With enhanced features and specifications, the Aakash tablet will now be available at a cost almost double its introductory price. Supposedly, the gadget failed to meet expectations of hundreds of students studying in Indian Institute of Technology all across the country. The IIT Rajasthan has released some criterion for Aakash tablet. According to the standards released by IIT Rajasthan, the inexpensive tablet should function at a temperature of 20 degree and up to 50 degree Celsius. It also stresses the tablet to be waterproof along with enduring steep and sudden fall. Not only this, it has specified a 1.2 Giga Hertz (GHz) microprocessor as against 366 megahertz (MHz) in Aakash and 700 RAM (Random Access Memory) megabytes, double of the original. The battery specified can run up to eight...

×
Skip to toolbar