New Stagefright attacks Android through audio files

Android

Android is in the verge of exploitation, again, with another Stagefright attack that can affect a billion of devices.

The said bug was first found in July and now it’s back. According to Zimperium Security, the new exploit can be done through an mp3 or mp4 audio file. A simple preview of the infected file is enough to wake the virus. It’s more concerning that the virus can be deployed on a public Wi-Fi network or even embedded in a web page which can turn itself to a self-replicating virus or worm.

Google is already working on a fix and we can expect a patch to roll out this month. No reported exploitation of the bug so far.

Stagefright started as a vulnerability issue among Android phones over text and MMS. The operating system’s multimedia preview function got exploited but it was addressed to some extent.

Source: Android Authority

The post New Stagefright attacks Android through audio files appeared first on YugaTech | Philippines News & Tech Reviews.

This iOS bug crashes your iPhone using one text message

There is a major bug spreading via text message that causesĀ iPhones to crash.

iphone-bug

The message is comprised of Arabic letters and can be received through SMS or iMessage. Once you receive this while the phone is in locked screen mode, it can cause the Messages app to completely stop working and eventually crash the entire phone. TNW mentionsĀ that the bug could be related to iOS processing of its Unicode text.

Beware of any messages containing the following characters:

?????????????????? ? ?h ? ? ?

As for the workaround, you must “send a photo or piece of text to the original sender using the share sheet in another app.” Reports also state the it is currently affecting iPhones running iOS 7 and 8. Apple is already aware of the matter and is working on a fix.

{Via} {Source}

The post This iOS bug crashes your iPhone using one text message appeared first on YugaTech | Philippines, Tech News & Reviews.

New blackmailing Trojan encrypts files using high-grade 1024-bit RSA key

By Gregg Keizer

June 8, 2008 (Computerworld) A security company on Friday asked for help cracking an encryption key central to an extortion scheme that demands money from users whose PCs have been infected by malware.

Kaspersky Lab, a Moscow-based antivirus firm, put out the call for assistance after it discovered a new variant of Gpcode, a Trojan horse that has been used in isolated "ransomware" attacks for the past two years.

In ransomware attacks, hackers plant malware that encrypts files and then displays a message demanding money to unlock the data. In the case of the newest Gpcode, 143 different file types are encrypted, including .bak, .doc, .jpg and .pdf.

Read more here.


New blackmailing Trojan encrypts files using high-grade 1024-bit RSA key

By Gregg Keizer

June 8, 2008 (Computerworld) A security company on Friday asked for help cracking an encryption key central to an extortion scheme that demands money from users whose PCs have been infected by malware.

Kaspersky Lab, a Moscow-based antivirus firm, put out the call for assistance after it discovered a new variant of Gpcode, a Trojan horse that has been used in isolated "ransomware" attacks for the past two years.

In ransomware attacks, hackers plant malware that encrypts files and then displays a message demanding money to unlock the data. In the case of the newest Gpcode, 143 different file types are encrypted, including .bak, .doc, .jpg and .pdf.

Read more here.