Moody's Downgrades Nokia Debt to Near Junk


Moody's ratings agency downgraded Nokia's debt grade to near junk status on Monday, citing a sharp decline in first-quarter cell phone sales that led to a 35 percent fall in revenue.

The agency lowered Nokia Corp.'s long-term credit rating by one notch to Baa3 — just a step above non-investment grade — following last week's profit warning which had caused Nokia's shares to plunge by more than 20 percent.

abcnews.go.com

... Link (0 comments) ... Comment



Android smartphones infected via drive-by exploit


At the RSA Conference 2012, former McAfee executives George Kurtz and Dmitri Alperovitch have presented a Remote Access Tool (RAT) that infects Android smartphones (version 2.2). They used an as-yet unpatched bug in Android's WebKit browser to inject the malware. The researchers say that they bought the vulnerability information, and a range of other tools, on the black market. The finished exploit is based on 20 components that apparently cost a total of $1,400 on the black market.

h-online.com

... Link (0 comments) ... Comment



Android-Smartphones per Drive-by infiziert


Die ehemaligen McAfee-Manager George Kurtz und Dmitri Alperovitch haben im Rahmen der RSA Conference 2012 ein Remote Access Tool (RAT) demonstriert, das Android-Smartphones (Version 2.2.) infiziert. Zum Einschleusen der Malware missbrauchten sie einen bisher nicht gepatchten Bug im Android-eigenen Web-Browser WebKit. Die Information über die Schwachstelle haben die Forscher zuvor zusammen mit anderen Tools auf dem Schwarzmarkt gekauft. Auf insgesamt 20 Komponenten basiert der fertige Angriff, die sämtlich für 1400 US-Dollar im Untergrund eingekauft wurden.

heise.de

... Link (0 comments) ... Comment



10 Steps To Smartphone Privacy


Smartphone owners, it's you versus bad guys and nosy apps. Follow these 10 tips to keep your data locked down.

Your smartphone is simultaneously your best friend and your worst enemy. It can help you find the nearest Starbucks for a caffeine fix, reach out to loved ones in times of need, or get the score of that vital play-off game. If it falls into the wrong hands, heck, even if it doesn't fall into the wrong hands, a smartphone can expose your contacts, location history, banking data, and more. Smartphone privacy was in the news again this week, due to a fresh Google and Apple iPhone privacy flap.

informationweek.com Smartphone Security Blankets

... Link (0 comments) ... Comment



Phone and email records to be stored in new spy plan


Details of every phone call and text message, email traffic and websites visited online are to be stored in a series of vast databases under new Government anti-terror plans.

Landline and mobile phone companies and broadband providers will be ordered to store the data for a year and make it available to the security services under the scheme.

The databases would not record the contents of calls, texts or emails but the numbers or email addresses of who they are sent and received by.

For the first time, the security services will have widespread access to information about who has been communicating with each other on social networking sites such as Facebook.

telegraph.co.uk

... Link (0 comments) ... Comment



"Handys bitte ausschalten." INDECT wtf?


Kurzbeschreibung Das europäische Forschungsprojekt INDECT war Berichtsthema des Innenausschusses des Bundestages vom 8.2.2012. Natürlich unter Ausschluss der Öffentlichkeit. Was INDECT ist und warum 1984 nicht nur für Paranoiker interessant sein könnte, dazu hier mehr. Beitragsart Feature Sprache deutsch Redaktionsbereich(e) Politik/Info Produktionsdatum 17.02.2012 AutorInnen linksdrehendes radio Radio Radio Blau, Leipzig 99,2 MHz Länge 6:11 Minuten Name/Größe 20120217-quothandys-46544.mp3 / 8700 kB Dateiformat MPEG-1 Layer 3, 192 kbit/s, Stereo, (44100 kHz) Datum 17.02.2012/23:55 Lizenz Creative-Commons

freie-radios.net

... Link (0 comments) ... Comment



Google Tracking iPhone Users? Data Mining at Its Finest


"Google's iPhone Tracking" blares the front page of today's Wall Street Journal. The article within outlines the secret creation and use of computer codes that were able to "trick Apple's Safari web-browsing software" into allowing Google to monitor what iPhone users were doing on the internet.

It only took one phone call from the Wall Street Journal and Google (GOOG) folded, removing the offending code from its ads. Talk about playing a weak hand of poker, but such is life when the issue at stake is privacy.

While it's easy to see why people are angry at these type of revelations, to be shocked or surprised to learn that companies are finding new ways to turn data into dollars, strikes Macke and I as a little naive.

finance.yahoo.com

... Link (0 comments) ... Comment



The Bug in Your Pocket: Remote Listening Applications for Mobile Phones


We've heard much recently about information that is being tracked by mobile phone companies (see our recent post) and app developers. However, there are more overt security threats that are potentially more dangerous.

One of these threats is referred to as either a “roving bug” or a “remote listening” application. It is essentially the same concept as a conventional audio bug, except that it requires no hardware other than a smartphone. Once installed, remote listening software enables a 3rd party to call a phone, activate its speakerphone capabilities, and secretly transmit any sounds picked by its microphone to another phone number, where it can be monitored and recorded.

mobileactive.org

... Link (0 comments) ... Comment



Satellite Phone Encryption Cracked


A team of German researchers appears to have cracked the GMR-1 and GMR-2 encryption algorithms used by many (though not all) satellite phones. Anyone fancy putting a cluster together for a listening party? 'Mr. Driessen told The Telegraph that the equipment and software needed to intercept and decrypt satellite phone calls from hundreds of thousands of users would cost as little as $2,000. His demonstration system takes up to half an hour to decipher a call, but a more powerful computer would allow eavesdropping in real time, he said.'

telegraph.co.uk cryptanalysis.eu

... Link (0 comments) ... Comment



ECJ asked to rule on mandatory retention of phone and internet data


THE HIGH COURT has asked the European Court of Justice to rule on the extent to which Ireland can require telecommunications providers to retain data about how people use its services.

The court has made a preliminary reference to the ECJ asking whether an EU directive – which requires member states to retain details of mobile phone calls, internet and email usage – respects the rights of the user.

thejournal.ie

... Link (0 comments) ... Comment



Podcast ‘Logbuch:Netzpolitik’ zur Funkzellenüberwachung


In der aktuellen Ausgabe von Logbuch:Netzpolitik gibt es zum ersten Mal einen Studiogast: Andre Meister, der für Netzpolitik.org die Berliner Funkzellenauswertungen aufgedeckt hat.

Andre erzählt ausführlich von seiner Recherche, den Ergebnissen und der politischen Dimension des Skandals. Weitere Themen sind der SOPA-Blackout, der Megaupload-Blackout und das Neonazi-Zentralregister.

netzpolitik.org

... Link (0 comments) ... Comment



Orbot: Tor on Android


Enhance your privacy, break through firewalls and communicate more safely.

Orbot is the official port of Tor to Android. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet.

STANDARD/NO ROOT:

  • Works best with Firefox Mobile+ProxyMob Add-on
  • Works with Orbot-enabled apps like Gibberbot (secure chat) and Orweb

ROOTED/SUPERUSER:

  • Supports transparent proxying of all apps and services, or app-by-app basis

tor, tor project, proxy, socks, circumvention, firewall, gfw, filtering, surveillance, security, guardianproject, guardian project

android.com

... Link (0 comments) ... Comment