Wonder what Google will have to say regarding this.
Security researchers have discovered malware hosted on the Google Play marketplace that went weeks undetected masquerading as games.
Android.Dropdialer, a Trojan that sends costly text messages to premium-rate phone numbers in Eastern Europe, had gone undiscovered for two weeks in the form of two game titles, Symantec researcher Irfan Asrar wrote in a blog post yesterday. The two games — “Super Mario Bros.” and “GTA 3 – Moscow city” — were uploaded to Google Play on June 24 and generated 50,000 to 100,000 downloads, Asrar said.
“What is most interesting about this Trojan is the fact that the threat managed to stay on Google Play for such a long time, clocking up some serious download figures before being discovered,” Asrar wrote. “Our suspicion is that this was probably due to the remote payload employed by this Trojan.”
The Trojan’s authors avoided detection during Google Play’s automated screening process by breaking up the malware into separate, staged payloads, Asrar said. Once downloaded and installed from Google Play, the apps would download an additional package for installation that sent the text messages.
- Premium-rate SMS malware survived in Google Play for weeks (androidauthority.com)
- New Android malware runs rings around Google Play security protocols (bgr.com)
- Google Play Fails to Remove All Super Mario Malware (f-secure.com)
In the world of search engine optimization …
Well, that “level playing ground” is here with the April 24th release of the Penguin algorithm update, which has affected an estimated 3% of all search queries. If you saw your blog traffic dip unexpectedly on this date, it’s possible you’ve been “pecked” by the Google Penguin—an indication that your blog is considered to be over-optimized in the eyes of the search giant.
Of course, knowing that you’ve been affected and taking remedial actions to recover from a Penguin penalty are two different things. Because of Google’s natural reticence when it comes to revealing the exact parameters that cause a site to be flagged for over-optimization, it’s impossible to know exactly which factors led to your site’s penalty.
The key to determining how to move forward following a Penguin attack lies in identifying potential over-optimization flags that can be quantified and measured by the search engines. Remember, the Googlebot can’t manually assess the quality of every website online. Instead, it must rely on measurable signals that can be used to infer objective value.
- How the Winners Do Mobile SEO [Guest Post] (distilled.net)
- Present on Some Common Search Engine Optimization Myths……… (kellymcloughlin.com)
- Important On-Page SEO Factors For Better Search Ranking (ppc.org)
- Recovering from Google Penguin (lettersfromdan.com)
Due to the loose restrictions Google places on it’s app-marketplace?
Clickjacking rootkits could pose the next big threat for the Android platform, according to a research team out of North Carolina State University. Led by computer science professor Xuxian Jiang, the team has developed a prototype clickjacking rootkit that’s more sophisticated than the other Android-oriented malware already out there.
This new prototype rootkit — which attacks the Android framework, rather than the kernel — differs from other malware in key ways, according to Jiang. “Unlike other rootkits for the platform, this one can function without a restart and without deep modification of the underlying firmware,” Jiang explained in a video in which he demonstrates the rootkit in action. “But it can still do all the things that a rootkit wants to do, such as hide or redirect apps.”
In other words just as with other computing devices keep anti-virus software up-to-date.
- Researchers create prototype Android clickjacking rootkit (androidauthority.com)
- “Clickjacking” Android could lead to app level phishing (h-online.com)
Great news if you use Google Docs.
The Google word-processing service is a Web-based alternative to programs such as Microsoft Word. Because Google Docs is a Web-based service, people who use the application have not been able to use it unless they have an Internet connection. But now that will be changing. And people will now be able to work in Google Docs on airplanes and other places where a Web connection may not be available.
Google said that other services, like Google Presentations and Spreadsheets will soon go offline as well. The company demonstrated how the offline Google Doc feature worked in Chrome.
The recent increase in attacks on security firms raises some important questions when it comes to protection of intellectual property.
The Internet‘s security infrastructure is under attack. Two major incidents against Comodo and RSA have raised the question of not just whether the enterprise can withstand hacker attacks but if the security firms we all count on to guard the infrastructure can protect themselves.
Earlier this week, Internet security firm Comodo revealed it had been tricked into minting nine high-value digital certificates that could allow the attackers to create fraudulent sites that fool users into thinking they are visiting Google, Yahoo, Skype or Microsoft’s Live service. The sting on Comodo follows a more serious attack on RSA, which netted the infiltrators unspecified information that could compromise the security of the company’s one-time password product SecurID.
These breaches follow other recent high-profile security events, including Anonymous’s campaign to compromise HBGary Federal and Stuxnet‘s use of stolen code-signing certificates against Iran‘s nuclear capability. Altogether, it’s undeniable that attackers now see the value in focusing on those companies and products that provide defense.
Be sure to go to the source to see what needs to change.
- Comodo hacker outs himself, claims “no relation to Iranian Cyber Army” (nakedsecurity.sophos.com)
- Hackers target Google, Skype with rogue SSL certificates (infoworld.com)
- Is SecureID broken? (kbtcomputers.wordpress.com)