Android app "Ever - Capture Your Memories" with 1M+ installs.
What began in 2013 as another cloud storage app has pivoted toward a far more lucrative business known as Ever AI — without telling the app’s millions of users.
https://www.nbcnews.com/tech/security/millions-people-uploaded-photos-ever-app-then-company-used-them-n1003371
What began in 2013 as another cloud storage app has pivoted toward a far more lucrative business known as Ever AI — without telling the app’s millions of users.
https://www.nbcnews.com/tech/security/millions-people-uploaded-photos-ever-app-then-company-used-them-n1003371
NBC News
Millions of people uploaded photos to the Ever app. Then the company used them to develop facial recognition tools.
“The app developers were not clear about their intentions," one Ever user said. "I believe it’s a huge invasion of privacy.”
Update WhatsApp!
WhatsApp just fixed a vulnerability that allowed malicious actors to remotely install spyware on affected phones, and an unknown number reportedly did so with a commercial-grade snooping package usually sold to nation-states.
https://techcrunch.com/2019/05/13/whatsapp-exploit-let-attackers-install-government-grade-spyware-on-phones/
WhatsApp just fixed a vulnerability that allowed malicious actors to remotely install spyware on affected phones, and an unknown number reportedly did so with a commercial-grade snooping package usually sold to nation-states.
https://techcrunch.com/2019/05/13/whatsapp-exploit-let-attackers-install-government-grade-spyware-on-phones/
TechCrunch
WhatsApp exploit let attackers install government-grade spyware on phones | TechCrunch
WhatsApp just fixed a vulnerability that allowed malicious actors to remotely install spyware on affected phones, and an unknown number reportedly did so with a commercial-grade snooping package usually sold to nation-states.
A Korean-speaking hacking group in operation since at least 2016 is expanding its arsenal of hacking tools to include a Bluetooth-device harvester in a move that signals the group’s growing interest in mobile devices.
https://arstechnica.com/information-technology/2019/05/korean-speaking-hackers-add-bluetooth-harvester-to-its-tool-arsenal/
https://arstechnica.com/information-technology/2019/05/korean-speaking-hackers-add-bluetooth-harvester-to-its-tool-arsenal/
Ars Technica
Bluetooth harvester signals hacking group’s growing interest in mobile
ScarCruft's new interest in mobile devices suggests the group's continuing evolution.
Android & iOS app "Call India - IntCall" allows anyone to register any phone number without OTP verification
This means that anyone can make calls spoofing any phone number.
This concerns only users from #India 🇮🇳
The app hasn't been updated since 2014.
https://www.news18.com/amp/news/tech/this-android-calling-app-presents-a-huge-threat-but-is-still-guarded-by-a-high-rating-2140363.html?__twitter_impression=true
This means that anyone can make calls spoofing any phone number.
This concerns only users from #India 🇮🇳
The app hasn't been updated since 2014.
https://www.news18.com/amp/news/tech/this-android-calling-app-presents-a-huge-threat-but-is-still-guarded-by-a-high-rating-2140363.html?__twitter_impression=true
News18
This Android Calling App Presents a Huge Threat, But is Still Guarded by a High Rating
TeleStar's 'Call India - IntCall' app can remotely authorise any random number on your phone, make remote phone calls using your number, and even include voice morphing, hence being a massive threat to security.
[technical analysis of WhatsApp vulnerability]
Vulnerable RTCP module is called before the WhatsApp voice call is answered - 0 click RCE.
https://research.checkpoint.com/the-nso-whatsapp-vulnerability-this-is-how-it-happened/
Vulnerable RTCP module is called before the WhatsApp voice call is answered - 0 click RCE.
https://research.checkpoint.com/the-nso-whatsapp-vulnerability-this-is-how-it-happened/
Check Point Research
The NSO WhatsApp Vulnerability - This is How It Happened - Check Point Research
Earlier today the Financial Times published that there is a critical vulnerability in the popular WhatsApp messaging application and that it is actively being used to inject spyware into victims phones. According to the report, attackers only need to issue…
U.S. immigration cops just spent $1 Million on iPhone hacking equipment.
GrayKey, previously described as the world’s best iPhone hacking tech for police and intelligence agents, allowing them to break passcodes and retrieve information from inside Apple devices.
https://www.forbes.com/sites/thomasbrewster/2019/05/08/immigration-just-spent-a-record-1-million-on-the-worlds-most-advanced-iphone-hacking-tech/
GrayKey, previously described as the world’s best iPhone hacking tech for police and intelligence agents, allowing them to break passcodes and retrieve information from inside Apple devices.
https://www.forbes.com/sites/thomasbrewster/2019/05/08/immigration-just-spent-a-record-1-million-on-the-worlds-most-advanced-iphone-hacking-tech/
Forbes
Immigration Cops Just Spent A Record $1 Million On The World's Most Advanced iPhone Hacking Tech
The GrayKey promises access to locked iPhones. And ICE is its biggest fan.
The simple reality is there are so many 0-day exploits for iOS and the only reason why just a few attacks have been caught in the wild is that iOS phones by design hinder defenders to inspect the phones.
So, if someone says there is no malware on iOS - it's not true - because there is no simple way to prove there was malware.
https://www.vice.com/en_us/article/pajkkz/its-almost-impossible-to-tell-if-iphone-has-been-hacked
So, if someone says there is no malware on iOS - it's not true - because there is no simple way to prove there was malware.
https://www.vice.com/en_us/article/pajkkz/its-almost-impossible-to-tell-if-iphone-has-been-hacked
Vice
It’s Almost Impossible to Tell if Your iPhone Has Been Hacked
A recent vulnerability in WhatsApp shows that there’s little defenders can do to detect and analyze iPhone hacks.
Google Play already scans apps for security issues!
In App Security Improvement program since 2015.
The program has helped more than 300,000 developers to fix more than 1,000,000 apps on Google Play. In 2018 alone, the program helped over 30,000 developers fix over 75,000 apps.
https://developer.android.com/google/play/asi
In App Security Improvement program since 2015.
The program has helped more than 300,000 developers to fix more than 1,000,000 apps on Google Play. In 2018 alone, the program helped over 30,000 developers fix over 75,000 apps.
https://developer.android.com/google/play/asi
Android Developers
App security improvement program | Security | Android Developers
Under the order that will take effect in the coming days, Huawei will need a U.S. government license to buy American technology.
In August, Trump signed a bill that barred the U.S. government itself from using equipment from Huawei and ZTE.
https://www.reuters.com/article/us-usa-china-huaweitech/chinas-huawei-70-affiliates-placed-on-u-s-trade-blacklist-idUSKCN1SL2W4
In August, Trump signed a bill that barred the U.S. government itself from using equipment from Huawei and ZTE.
https://www.reuters.com/article/us-usa-china-huaweitech/chinas-huawei-70-affiliates-placed-on-u-s-trade-blacklist-idUSKCN1SL2W4
Reuters
China's Huawei, 70 affiliates placed on U.S. trade blacklist
WASHINGTON/NEW YORK (Reuters) - The U.S. Commerce Department said on Wednesday it is adding Huawei Technologies Co Ltd and 70 affiliates to its so-called “Entity List” - a move that bans the telecom giant from buying parts and components from U.S. companies…
🤡2
Account takeover prevention
We found that an SMS code sent to a recovery phone number helped block 100% of automated bots, 96% of bulk phishing attacks, and 76% of targeted attacks. On-device prompts, a more secure replacement for SMS, helped prevent 100% of automated bots, 99% of bulk phishing attacks and 90% of targeted attacks.
https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html?m=1
We found that an SMS code sent to a recovery phone number helped block 100% of automated bots, 96% of bulk phishing attacks, and 76% of targeted attacks. On-device prompts, a more secure replacement for SMS, helped prevent 100% of automated bots, 99% of bulk phishing attacks and 90% of targeted attacks.
https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html?m=1
Googleblog
New research: How effective is basic account hygiene at preventing hijacking
Posted by Kurt Thomas and Angelika Moscicki Every day, we protect users from hundreds of thousands of account hijacking attempts. Most at...
Analysis of UC Browser bug that could run unverified code.
Vulnerability in UC Browser could distribute and launch malicious libraries. These libraries will work in the context of the browser, resulting in full system privileges that the browser has.
https://m.habr.com/en/company/drweb/blog/452076/
Vulnerability in UC Browser could distribute and launch malicious libraries. These libraries will work in the context of the browser, resulting in full system privileges that the browser has.
https://m.habr.com/en/company/drweb/blog/452076/
Habr
Breaking UC Browser
Introduction At the end of March we reported on the hidden potential to download and run unverified code in UC Browser. Today we will examine in detail how it...
Google has stopped providing Huawei with hardware and software products.
In other words, while Huawei can still use Android itself, most proprietary services will be inaccessible — including the Google Play Store, Gmail, and presumably anything else that requires the closed-source Play Services Framework.
https://www.androidpolice.com/2019/05/19/huaweis-future-phones-reportedly-wont-have-access-to-google-services-including-the-play-store/
In other words, while Huawei can still use Android itself, most proprietary services will be inaccessible — including the Google Play Store, Gmail, and presumably anything else that requires the closed-source Play Services Framework.
https://www.androidpolice.com/2019/05/19/huaweis-future-phones-reportedly-wont-have-access-to-google-services-including-the-play-store/
Android Police
[Update x3: Official Huawei/Honor statement] Future Huawei phones reportedly won't have access to Google services, including the…
Last week, the United States added Huawei to its 'Entity List', meaning US companies can't do business with Huawei without explicit government approval. A... by Corbin Davenport in Breaking, Google, Huawei, News
🤡1
Android Security & Malware
Google has stopped providing Huawei with hardware and software products. In other words, while Huawei can still use Android itself, most proprietary services will be inaccessible — including the Google Play Store, Gmail, and presumably anything else that requires…
This means that Huawei loses Android updates and all their users access to Google Play Store.
🤡1
Over 19 Android vulnerability reports in one place
https://twitter.com/fs0c131y/status/1129680329994907648
https://twitter.com/fs0c131y/status/1129680329994907648
Twitter
Baptiste Robert
<MEGA THREAD> A lot of people want to start doing security on Android. In my opinion, one of the best way to do it is to read all the fantastic write ups/bug reports made by the community. Can you share in the comments, all the Android articles/write ups/bug…
VidMate - Chinese video app with 500M+ installs is charging people, draining their batteries, and exposing data without their knowledge.
https://www.buzzfeednews.com/article/craigsilverman/vidmate-app-download
https://www.buzzfeednews.com/article/craigsilverman/vidmate-app-download
BuzzFeed News
A Huge Chinese Video App Is Charging People, Draining Their Batteries, And Exposing Data Without Their Knowledge
VidMate told BuzzFeed News it was investigating the claims, but declined to share basic information about its employees and ownership.
👎1
Facebook Messenger Bug in Android
An attacker is able to send media messages on behalf of other users on Facebook Messenger
https://bugreader.com/kbazzoun@sending-message-on-behalf-of-other-users-72
An attacker is able to send media messages on behalf of other users on Facebook Messenger
https://bugreader.com/kbazzoun@sending-message-on-behalf-of-other-users-72
Bugreader
Sending message on behalf of other users
This could have allowed a malicious user to send media messaged on behalf of other users by making them(victims) admins on his page .