Google Android 2.3 Security Bug Enables Access to Your Personal Information

By JDavis | 2/2/11 2:35 AM

A North Carolina University researcher warns consumers that the Google Android 2.3 mobile device software has a major security flaw, which could enable hackers to access their personal information via the microSD card. Released just in December, the latest release of Android Gingerbread introduced several new improvements (one of which supposedly addressed its microSD vulnerability issue). However, Android Gingerbread isn’t perfect.

AOL Engadget warns readers that,

Read More >

VIDEO: Circumventing iPhone Security with the Push of A Button

By JDavis | 10/25/10 11:48 AM

A tech savvy iPhone user has posted a video demonstrating a new finding; there's an easily executable and potentially serious flaw in the iPhone password security function. Under the right circumstances, a simple press of the iPhone's lock button will allow a malicious user to bypass the phone's password protection and enter into the main phone app. Here, anyone can view the phone's call history and stored contacts and listen to voicemail.

Read More >

Buggy Breathalyzer Bounces Boozers

By JDavis | 5/31/09 7:01 PM

DUI defendants are asking courts to mandate source code reviews on the software that runs breathalyzer devices to determine if bugs or malware is present. While it’s easy to see how this tactic would be employed in attempts to get charges reduced or dropped, the more serious issue could be the device failing to detect when a person is under the influence, thus sending them back on the road. Two independent reviews weigh in, according to an Ars Technica article.

The reviews differ in scope and offer different conclusions, but they both agree that the code falls below industry-standard best practices and that it contains bugs. The [Base One] report identifies 24 major defects and points to a wide range of troubling issues. The analysts discovered that the embedded software disables safeguard features built into the device's processor that are intended to detect and prevent the execution of invalid or corrupt instructions. The researchers contend that this circumvention can lead to unpredictable results in the event of fatal errors.

In his blog, security expert Bruce Schneier further notes:

Read More >