Security firm FireEye has discovered a major security flaw in Google’s mobile operating system, ComputerWorld reports, which could allow an attacker to modify the behavior of an app icon in the launcher in order to send users to a malicious site that would collect personal data.
Another day, another vulnerability. Good luck getting an update.
Forty-four-and-a-half years after the hoedown at Max Yasgur’s farm in Bethel, New York, the last Volkswagen Type 2 Transporter rolled off the line in Brazil. Still featuring the “bay window” styling its worn since a major revision for 1968, though with a form-follows-function radiator grille for the now-water-cooled engine, the ol’ Kombi is a lot of things to a lot of people.
The end of an era.
But today, the content distribution network CloudFlare has announced Heartbleed may not allow access to those private keys after all. In two weeks of testing, the company has been unable to successfully access private keys with Heartbleed, suggesting the attack may not be possible at all. “If it is possible, it is at a minimum very hard,” researcher Nick Sullivan writes. “And we have reason to believe… that it may in fact be impossible.”
Hopefully good news.
While Google said in a blog post on April 9 that all versions of Android are immune to the flaw, it added that the “limited exception” was one version dubbed 4.1.1, which was released in 2012.
Google is rolling out a new update to Android that means its operating system will start continually checking its host device for harmful apps.
Good luck getting the update.
It applies to tablets and phones with a screen size of 9 inches or less.
What if anything will this do to Android?
Now, this is interesting. Maybe now developers will pay attention to the platform because Windows Phone is a cool OS, but lacks the apps.
Also, the Mac and iOS versions have been updated.