Exploits Propagated Via Social Media Increase 28
Orome1 writes "Infection via email, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook 'Like' button, fake Web pages positioned on search engines (BlackHat SEO), and zero-day vulnerability exploits. The rise in popularity of smart phones powered by Google's Android operating system for smart phones has been accompanied by an increase in attacks targeting these devices. A number of different threats have appeared, primarily aimed at racking up phone bills or using the geolocalization function to transmit a user's position to a third party."
Google Android Exploits (Score:3, Interesting)
And here I am with an android phone that's running 1.5 because the vendor refuses to release any more updates for this 1-year old model of phone.
Oh, wait, that's right, I already rooted and upgraded to 2.2. Nevermind.
Re: (Score:1)
Re: (Score:1)
The Android Developer reference says otherwise [android.com]:
Re: (Score:1)
Re: (Score:3, Insightful)
And actually using an Android phone says otherwise. Just install a simple app like "Text Edit" by Paul Mach - easy to find on the market. Before installing, hit the menu softkey, then the security icon that pops up. It will say "No permissions required."
Use it, save a file. Where does the file end up? On your SD card. How did it do that?
Now go to the homescreen, hit menu, applications, manage applications, text edit. Scroll down and what do we see under permissions? "modify/delete SD card contents" and "rea
Re: (Score:2)
Now go to the homescreen, hit menu, applications, manage applications, text edit. Scroll down and what do we see under permissions? "modify/delete SD card contents" and "read phone state and identity". Permissions you were NOT warned about during the install.
Is this more of an issue with the Market (which is, of course, Google's to fix)?
Re: (Score:2, Interesting)
Yet, the application must have requested WRITE_EXTERNAL_STORAGE [android.com] in its Manifest.xml. If Market didn't tell you about it, that's a Market issue.
All applications can READ from the external storage, which is considered public. Private data, OTOH, is required to be stored on the internal storage. This is secifically mentioned in the Developer Guide. If an app is storing private data on the external storage, then you need to tell the author that he or she is stupid. You can, of course, always remove files fro
Re: (Score:3, Interesting)
Market and Android are one and the same. You can argue all day about how the documentation says this, and the AOSP code doesn't contain that, but at the end of the day, any Android device worth using has the Market app on it. People install apps through the market and have no idea that (#1) apps like "Text Edit" that didn't even ask for SD card permissions might save their documents on the SD card, and (#2) that any app that requests internet access will be able to upload those documents along with your pho
Kind of humorous, actually (Score:1)
Today the guys trying to force Seattle to give away public park land to a Chihulhy museum hacked the social media SLOG site poll to "fix" a poll that was going heavily against them.
Link as follows: Chihulhy.com hacks SLOG poll as they lose to Tiger Breeding option [strn.gr]
Very sad.
But the Android OS holes and exploits are more likely due to it's popularity amongst tech geeks.
In my personal experience, most people prefer the iPhone, but I always say if you're a tech geek, you should opt for the Android instead, cause
Why does Facebook allow the fake "Like" apps? (Score:2)
They're really deceiving.
Re: (Score:2)
Bounce around much? (Score:5, Interesting)
yet it likes to bounce around to
"The rise in popularity of smart phones powered by Google's Android operating system for smart phones has been accompanied by an increase in attacks targeting these devices."
Then to
There has also been a great deal of commotion around two serious zero-day flaws in Microsoft OS code, one of which was exploited to attack SCADA systems (specifically in, nuclear power stations).
This article really has nothing to say about the rise of use of social media as a vector, other than mentioning the recent twitter exploits--in the last paragraph. Why did this article make it to the front page again?
Re: (Score:2)
Why did this article make it to the front page again?
Because it falls right in line with the, "We're all screwed. The world is going to end. Tomorrow is worse than yesterday. The fall of civilization is on the horizon. DOD has adopted perl as its primary nuclear arsenal launch control language..." theme that is so prevalent in news these days.
Re: (Score:2)
Zero Day Exploits (Score:2)
Zero Day Exploits don't seem to have anything to do with Social Media, even though thrown thrown in as a subcategory.
Duh (Score:4, Insightful)
People with nefarious goals target massively popular services with shitty security and largely uninformed users. Film at 11.
Statestheobviousman (Score:4, Insightful)
In other news, the rise in people having unprotected sex resulted in a rise in pregnancies.
And a rise in the number of boaters has increased the number of boating accidents.
Social Media? Gr8 (Score:4, Funny)
No way! (Score:2, Insightful)
I say no way! Nobody could be pirating my clicks. /drools and goes back to raising virtual pigs and sending virtual gifts to virtually unknown "friends."
Comment Count (Score:3, Insightful)
Hell, if anything, I call it digital natural selection. Taking out the weak and ignorant one Like at a time.
Re: (Score:2)
Hell, if anything, I call it diggital natural selection. Taking out the weak and ignorant one Like at a time.
FTFY