•   
  •   

Tech & Science Report: Vulnerability Discovered In Hundreds Of Popular Android Apps

06:40  22 november  2019
06:40  22 november  2019 Source:   lifehacker.com.au

Sign Up To Test GitHub's New iOS And Android Apps

  Sign Up To Test GitHub's New iOS And Android Apps Github is an excellent resource for programmers of all levels and serves as a great repository of readily available software and development tools. The website is a chore to use on anything other than a desktop, but that could soon change thanks to a new dedicated app that GitHub is asking you to help beta test. To get started, you can check out GitHub’s official beta sign up page, or you can jump directly to your platform of choice—iOS or Android—if you have an active GitHub account. The iOS beta is currently live, and the Android beta is more of a wait list than an app you can grab right now. require(["inlineoutstreamAd", "c.

According to a report , vulnerabilities may persist even in apps recently published on Google Play. We found that three vulnerabilities of critical severity (Arbitrary Code Execution) from 2014, 2015 and 2016 still exist in hundreds of popular Android apps , including Yahoo Browser, Facebook.

An investigation into Android security by Check Point Software Technologies has uncovered hundreds of apps on the Google Play Store that are vulnerable to attack. It discovered three vulnerabilities of 'critical severity' lurking in hundreds of popular apps . You can check out the full report below.

Image: Supplied Image: Supplied

An investigation into Android security by Check Point Software Technologies has uncovered hundreds of apps on the Google Play Store that are vulnerable to attack. This includes high-profile apps like Facebook, Messenger, Yahoo, Wechat and Instagram. Here are the details

Researchers at Check Point Software Technologies scanned the Google Play Store for known patterns associated with vulnerable versions of open-source code. It discovered three vulnerabilities of critical severity lurking in hundreds of popular apps.

What's surprising is that these vulnerabilities are known to have been fixed. Yet they remain present in many Android apps due to the use of outdated code - and updating to the latest version doesn't help matters. As the report explains:

How To Check If You Have Access To Google's RCS Messaging

  How To Check If You Have Access To Google's RCS Messaging RCS messaging is here—thanks, Google—but there’s still a chance that you can’t flip the switch on it because, again, Google. Yes, it’s another feature rollout, which means you’ll be staring at your phone for some unknown amount of time, hoping it reveals to you the setting you can use to turn on something that sounds really awesome on paper. If you have no idea what we’re talking about, here’s the super-short version. Consider RCS messaging to be a super-improved version of SMS, the way you currently text your friends all day long.

Video: Hundreds of Android apps contain open, vulnerable ports The report didn't list any of the vulnerable apps , and with good reason: 50% of those discovered have Open ports aren't enough on their own to make an app vulnerable : Exploits have to be discovered in problem apps as well.

Popular Android apps , like Facebook and Instagram are full of serious security holes discovered in 19 popular and regularly updated Android apps on the Google Play Store, report vulnerabilities , discovered more than two years ago, make hundreds of applications potentially vulnerable to

The common perception consumers have around vulnerabilities is that as soon as they are discovered, they’re immediately patched, so by updating their device with the latest software, they are keeping it secure. In reality, long-known vulnerabilities may persist even in apps recently published on Google Play.

[These] three vulnerabilities, all fixed over two years ago, make hundreds of apps potentially vulnerable to remote code execution.

Popular apps known to be affected include:

  • LiveXLive
  • Moto Voice BETA
  • Yahoo! Transit
  • Yahoo! Browser
  • Yahoo! MAP
  • Yahoo! Car Navigation
  • Facebook
  • Messenger
  • SHAREit
  • Mobile Legends: Bang Bang
  • Smule
  • JOOX Music
  • WeChat
  • AliExpress
  • Video MP3 Converter
  • Lazada
  • VivaVideo
  • Retrica
  • TuneIn

According to heck Point Software Technologies, these vulnerabilities could allow hackers to steal and alter posts on Facebook or read messages in WeChat, to give just two examples.

Apple Just Banned Vaping Apps On iOS

  Apple Just Banned Vaping Apps On iOS In accordance with new App Store guidelines, Apple removed 181 vape-related apps from the platform and is outright banning the inclusion of any vape-related apps or features in its app marketplace. It might seem like a sudden move on the company’s part, but Apple has been slowly moving towards this inevitable ban for months now—and it’s easy to see why. Vaping is often portrayed by the vape industry as being healthier and safer than smoking cigarettes, but the government and private organisations have been advocating against the use of vape products almost as passionately as they do against smoking, and with good reason.

Overview of Android and iOS Mobile Application Security Testing Tools: Mobile technology and Smartphone devices are the two popular terms that are There are various reasons to say why mobile app security testing is important. Few of them are – To prevent fraud attacks on the mobile app , virus

Android camera app bug could affect ' hundreds of millions of phones'. A new vulnerability has been found in the Camera apps for millions, if not hundreds of millions, of Android devices. [It] allows apps to take pictures, record videos, or get a device's location even if they do not have permissions to

As mentioned above, the problem has to do with outdated, open-source code finding its way into commercial applications. These are typically reusable components written in a low-level language such as C. While these vulnerabilities are usually found and fixed in open-source projects, their maintainers have no control over apps using these native libraries. Subsequently, a commercial app may keep using the outdated version of the code even years after the vulnerability is discovered.

According to Check Point Software Technologies, there's not much the end user can do about these vulnerabilities other than follow the usual security precautions and hoping for the best. You can check out the full report below.

[Via Check Point Software Technologies]

How To Set Up A Second Google Account And How To Use It .
A Google account gives you access to a host of apps, covering email, maps, cloud storage, music, movies, productivity tools and more—and you don’t have to settle for just one account. Whether you’ve been given a second account for work or want a second one for personal use, here’s how to get it set up and integrated into your life. Setting up a second account © Screenshot: Gizmodo Google will want a few details from you. (Screenshot: Gizmodo) You’ll need to give Google some information, and a phone number, to set up a second account, which you can do from here.

—   Share news in the SOC. Networks

Topical videos:

usr: 1
This is interesting!