<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          US EUROPE AFRICA ASIA 中文
          World / US and Canada

          New ways found to attack Android phones

          (Agencies) Updated: 2012-07-26 17:06

          LAS VEGAS - Hacking experts on Wednesday demonstrated ways to attack Android smartphones using methods they said work on virtually all such devices in use today, despite recent efforts by search engine giant Google to boost protection.

          Experts showed off their prowess at the Black Hat hacking conference in Las Vegas, where some 6,500 corporate and government security technology workers gathered to learn about emerging threats to their networks.

          "Google is making progress, but the authors of malicious software are moving forward," said Sean Schulte of Trustwave's SpiderLabs.

          Google spokeswoman Gina Scigliano declined to comment on the security concerns or the new research.

          Accuvant researcher Charlie Miller demonstrated a method for delivering malicious code to Android phones using a new Android feature known as near field communications.

          "I can take over your phone," Miller said.

          Near field communications allow users to share photos with friends, make payments or exchange other data by bringing Android phones within a few centimeters of similarly equipped devices such as another phone or a payment terminal.

          Miller said he figured out how to create a device the size of a postage stamp that could be stuck in an inconspicuous place such as near a cash register at a restaurant. When an Android user walks by, the phone would get infected, said Miller.

          He spent five years as a global network exploit analyst at the US National Security Agency, where his tasks included breaking into foreign computer systems.

          "Wild west"

          Miller and another hacking expert, Georg Wicherski of CrowdStrike, have also infected an Android phone with a piece of malicious code that Wicherski unveiled in February.

          That piece of software exploits a security flaw in the Android browser that was publicly disclosed by Google's Chrome browser development team, according to Wicherski.

          Google has fixed the flaw in Chrome, which is frequently updated, so that most users are now protected, he said.

          But Wicherski said Android users are still vulnerable because carriers and device manufacturers have not pushed those fixes or patches out to users.

          Marc Maiffret, chief technology officer of the security firm BeyondTrust, said: "Google has added some great security features, but nobody has them."

          Experts say iPhones and iPads don't face the same problem because Apple has been able to get carriers to push out security updates fairly quickly after they are released.

          Two Trustwave researchers told attendees about a technique they discovered for evading Google's "Bouncer" technology for identifying malicious programs in its Google Play Store.

          They created a text-message blocking application that uses a legitimate programming tool known as java script bridge. Java script bridge lets developers remotely add new features to a program without using the normal Android update process.

          Companies including Facebook and LinkedIn use java script bridge for legitimate purposes, according to Trustwave, but it could also be exploited maliciously.

          To prove their point, they loaded malicious code onto one of their phones and remotely gained control of the browser. Once they did that, they could force it to download more code and grant them total control.

          "Hopefully Google can solve the problem quickly," said Nicholas Percoco, senior vice president of Trustwave's SpiderLabs. "For now, Android is the Wild West."

          Trudeau visits Sina Weibo
          May gets little gasp as EU extends deadline for sufficient progress in Brexit talks
          Ethiopian FM urges strengthened Ethiopia-China ties
          Yemen's ex-president Saleh, relatives killed by Houthis
          Most Popular
          Hot Topics

          ...
          主站蜘蛛池模板: 色综合久久久无码网中文| 久久人人爽人人爽人人av| 少妇被粗大的猛烈进出动视频| 免费无码中文字幕A级毛片| 国产成人MV视频在线观看| 漂亮的人妻不敢呻吟被中出| 久久精品国产亚洲av天海翼| 欧美视频在线观看第一页| 日韩卡一卡2卡3卡4卡| 视频一区二区三区中文字幕狠狠| 日本高清视频网站www| 国产精品成人免费视频网站京东 | 免费VA国产高清大片在线 | 国产精品国产三级欧美二区| 18禁在线一区二区三区| 色婷婷亚洲综合五月| 国产高清无遮挡内容丰富| 国产精品三级一区二区三区| 中文字幕日韩精品亚洲一区| 国产成人啪精品午夜网站| 国产大陆av一区二区三区| 免费国产一级特黄aa大片在线| 亚洲中文字幕无码专区| 国产精品自在拍首页视频8| 国产福利在线观看免费第一福利| 日产国产一区二区不卡| 免费无码肉片在线观看| 国产一区二区三区在线观看免费 | jizzjizz少妇亚洲水多| 天天插天天干天天操| 欧美激情一区二区三区成人| 国产小嫩模无套中出| 国产不卡精品视频男人的天堂| 伊人色综合网久久天天| 精品国产亚洲午夜精品av| 亚洲爆乳大丰满无码专区| 日韩深夜福利视频在线观看| 日韩av一区二区三区不卡| 日韩av在线不卡一区二区三区| 亚洲精品国产福利一区二区| 亚洲老熟女一区二区三区|