Malware Botnet may have framed Android

Android may have been wrongly maligned for its role in a malware botnet, security researchers have admitted, with findings that devices running Google’s software could be responsible for spam potentially fooled by a fake email signature. Despite claims from Sophos and Microsoft earlier this week that email header information pinned down Android devices as the guilty carriers, each has since backtracked having conceded that Android’s involvement is in no way certain.

“It’s entirely possible that bot on a compromised PC connected to Yahoo Mail, inserted the the message-ID thus overriding Yahoo’s own Message-IDs and added the “Yahoo Mail for Android” tagline at the bottom of the message all in an elaborate deception to make it look like the spam was coming from Android devices” Microsoft  engineer Terry Zink wrote in a follow-up to his earlier comments on the botnet. However, the security researcher still isn’t willing to let Android off the hook.

“On the other hand, the other possibility is that Android malware has become much more prevalent and because of its ubiquity, there is sufficient motivation for spammers to abuse the platform. The reason these messages appear to come from Android devices is because they did come from Android devices” Zink theorized. “Before writing my previous post, I considered both options but selected the latter.”

As for Sophos, senior security adviser Chester Wisniewski has confirmed he is rechecking the company’s own findings to see if a fake signature could be responsible for mistaken identity. “We don’t know for sure that it’s coming from Android devices” Wisniewski said on Thursday, though went on to maintain that in his belief it is a botnet running on Android phones rather than something else.

“We either have a new PC botnet that is exploiting Yahoo!’s Android APIs or we have mobile phones with some sort of malware that uses the Yahoo! APIs for sending spam messages” the researcher wrote. “One of the interesting data points supporting the argument that this is new Android malware is the unusually large number of the originating IPs on cellular networks.”

Google, meanwhile, continues to protest Android’s innocence. “The evidence we’ve examined does not support the Android botnet claim” a company spokesperson said. “Our analysis so far suggests that spammers are using infected computers and a fake mobile signature to try to bypass anti-spam mechanisms in the email platform they’re using. We’re continuing to investigate the details.”

[via WSJ]


Malware Botnet may have framed Android is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


CyanogenMod plans a quick leap to Jelly Bean for version 10, existing devices likely to tag along

CyanogenMod new logo

Whenever there’s a new version of Android, Steve Kondik and the CyanogenMod team tend to swing into action almost immediately with plans for a major revision of the fan-favorite platform overhaul. For Android 4.1 Jelly Bean, that swing will be faster than ever. The crew’s early looks suggest that there will only be a few minor tweaks needed to merge Google’s latest with the custom Android code, making CyanogenMod 10 a relative snap to produce. The update’s release is still very much up in the air without the Android Open Source Project code available to modify; that said, device compatibility also isn’t expected to be an obstacle. Any device that can run CyanogenMod 9 should run version 10 when it’s released. As long as we’re willing to wait for a stable 9.0 to emerge first, there are few barriers to making Jelly Bean that much sweeter.

CyanogenMod plans a quick leap to Jelly Bean for version 10, existing devices likely to tag along originally appeared on Engadget on Thu, 05 Jul 2012 18:58:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCyanogenMod (Google+)  | Email this | Comments

CyanogenMod’s Steve Kondik and crew talk Android hacking in Google I/O video

cyanogenmod-crew-talk-android-mods-video

If you’ve ever slapped a CyanogenMod ROM on your Android phone instead of waiting months or longer for an official update, you may have wondered who was behind it and how they did it. Well, CM founder Steve Kondik spilled the beans to developers at Google’s I/O conference, and the first half of that presentation is now up on YouTube. It not only provides the modders’ MO, but also reveals a few things about the green robot itself. The second half of the presentation will be coming soon as well, but this one is must-watch territory for tinkerers — go past the break to check it out.

Continue reading CyanogenMod’s Steve Kondik and crew talk Android hacking in Google I/O video

CyanogenMod’s Steve Kondik and crew talk Android hacking in Google I/O video originally appeared on Engadget on Thu, 05 Jul 2012 07:36:00 EDT. Please see our terms for use of feeds.

Permalink Phandroid  |  sourceYouTube  | Email this | Comments

Nexus 7 tablet UI hack opens up landscape use

Stare long enough at Google’s promo material for the Nexus 7 tablet and you’ll eventually notice something: in all situations bar media playback, Google only ever shows the slate in portrait orientation. That’s because the tablet is actually locked that way, at least in the homescreen; however, the enterprising souls over at xda-developers have come up with a simple way to force Google’s new Nexus into showing its true tablet colors, with a straightforward tweak enabling homescreen landscape orientation and the proper tablet UI.

Exactly why Google opted to lock the Nexus 7 homescreen into portrait orientation isn’t specified, but the company seems to be implying that it expects owners to grab them one-handed and use them for tasks like reading. In contrast, 10-inch Android slates are generally shown in landscape orientation, though they at least don’t require hacks to enable the alternative.

Although the instructions (shown below, if you’re already the proud owner of a Nexus 7) are relatively easy to follow, it’s worth noting that Jelly Bean on the Nexus 7 isn’t quite ready for horizontal use. There are apparently some font issues, as well as glitches with the preview thumbnails in the multitasking dialog, though nothing too dramatic.

Our guess is that as we see more Jelly Bean slates, official landscape homescreen mode support will also arrive. When, though, that might actually happen depends on how quickly Android OEMs get to work. More on the Nexus 7 in our full review.

Instructions:

1. Get a file explorer such as root explorer or es file manager(go to settings allow mount rewritable and root access)
2.Then go to system(es file manager just go to the star button on the top left hand side and click on the phone button and you will see the system folder)
3.You will find a build.prop file make sure to make a copy of it and save it somewhere just in case for a backup.
4.Then click on the build.prop and open it with a text editor. (ES file manager has its own)
5. Now scroll down to “ro.sf.lcd_density”, or something with lcd density(sorry im at work so i dont have my n7 with me)
6. Now the original lcd density is 213 so the best result for tablet mode is going 170 and below.
7. Save the file by press the menu button.
8. Reboot your N7 and then you got Tablet UI.

nexus_7_tablet_ui_hack_1
nexus_7_tablet_ui_hack_2
nexus_7_tablet_ui_hack_3
nexus_7_tablet_ui_hack_4
nexus_7_tablet_ui_hack_5
nexus_7_tablet_ui_hack_6

[via Pocketnow]


Nexus 7 tablet UI hack opens up landscape use is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Inside Google’s amazing Accessory Development Kit demo hardware (video)

DNP Handson with Google's amazing Accessory Development Kit demo hardware

The coolest thing at Google I/O this year isn’t a cheap tablet or a pair of overpriced glasses or even a killer keyboard. It is, believe it or not, an alarm clock. But not just any alarm clock — this is an alarm clock with potential. What you see above, and demonstrated in the video after the break, is the gadget that was handed out to attendees who went to learn about the Android Accessory Development Kit. It has an array of RGB LEDs on the front which it can use to display simple numerals and digits, but thanks to a bevy of sensors — and plenty of connectivity options — that’s just the beginning. USB? Check. NFC? Definitely. Accelerometer, colorimeter, magnetometer, barometer, hygrometer, thermometer? Yes, all that and more.

What starts out as an oddly shaped clock held together only with magnets has the potential to be hacked into something truly amazing — and that’s the point. With this, developers have what they need to try out all sorts of crazy ideas relying on a wide assortment of sensors. It’s an empowering collection of abilities and, when a dev finds some combination that works, they can turn around and spin that into something new. We’re very eager to see what eager engineers do with their ADK demo units, but for now you can see what it can do right out of the box in the video below.

Continue reading Inside Google’s amazing Accessory Development Kit demo hardware (video)

Inside Google’s amazing Accessory Development Kit demo hardware (video) originally appeared on Engadget on Fri, 29 Jun 2012 09:16:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

Nexus Q hacked to run Android games in under 24 hours

Nexus Q hacked to run Android games in under 24 hours

The word “run” in the headline is chosen very carefully. Developer Christina Kelly managed to get Swords and Soldiers up and running on the Nexus Q, but the game is not actually playable. Without a touchscreen or any other way to actually control the title, there’s not much to do besides look at the splash screen. Still, the fact that in under 24 hours Google’s new streaming appliance has already made to fire up unapproved apps bodes well for its future with the hacker community. Once the device gets in the hands of more devs we imagine it’ll only a matter of time before someone figures out a way to get Hulu or Netflix running on it, with your Android phone acting as the remote.

Nexus Q hacked to run Android games in under 24 hours originally appeared on Engadget on Thu, 28 Jun 2012 18:16:00 EDT. Please see our terms for use of feeds.

Permalink TechnoBuffalo  |  sourceSlashGear  | Email this | Comments

Crayolascope hacks toys into foot-thick 3D display

DNP Crayolascope hacks toys into footthick 3D display

Artist Blair Neal, as many other great creators have before him, turned to children’s toys as the source of inspiration for his latest project. Crayolascope is a rudimentary 3D display hacked together from several Glow Books, a light-up play on a flip-book from the titular company. The installation, currently housed at the New York Hall of Science in Flushing, layers 12 of its component clear plastic sheets to create a roughly one-foot deep display that plays a simple pre-drawn animation. The whole thing is controlled by an Arduino Mega, that can either play back the neon scribbles at varying speeds (controlled by a knob built into the console) or scrub through frame by frame. Neal isn’t quite done tweaking the Crayolascope either. As it stands he’s limited to between 14 and 18 frames, before it becomes too difficult to see through the sheets. And it requires near total darkness for optimal operation. To see it in action check out the video after the break.

Continue reading Crayolascope hacks toys into foot-thick 3D display

Crayolascope hacks toys into foot-thick 3D display originally appeared on Engadget on Mon, 25 Jun 2012 16:59:00 EDT. Please see our terms for use of feeds.

Permalink Make  |  sourceBlair Neal  | Email this | Comments

Two LulzSec members plead guilty to hacking charges

Back in March, notorious hacking group LulzSec was brought down by the FBI following cooperation from the group’s leader, Hector Xavier Monsegur aka “Sabu”. Four members of the group that were arrested appeared today at Southwark Crown Court to plead against the charges brought against them, with two admitting that they hacked high profile websites and the other two denying all the charges.

Jake David, aka Topiary, and Ryan Cleary both admitted that they were part of the LulzSec group, but overall only pleaded guilty to two out of the four charges brought against them. Ryan Ackroyd, aka Kayla, pleaded not guilty to all four charges, while an unnamed 17 year old also pleaded not guilty to all charges.

The group performed numerous hacks on high profile targets such as the CIA and the Pentagon, and leaked the names of 73,000 X-Factor contestants. Other targets included the NHS, Sony, Nintendo, 20th Century Fox, and News International. The trial for the case will be held in April 2013.

[via BBC]


Two LulzSec members plead guilty to hacking charges is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.