LONDON, July 30. / ITAR-TASS /. Experts have found a vulnerability, endangering personal data owners of Android-devices, the Financial Times reported, citing data specialists detect threats.
Hackers can create fake identification codes, by which the application is perceived as worthy of trust, experts warn company Bluebox Security. The trick, giving more downloads, provides insights into the mobile device and access the data stored in it.
“Cybercriminals could use a loophole and get access to the data stored in a separate application or the whole device. Under threat and transactions through mobile banking, and corporate e-mail data, “- said the technical director Jeff Forristal Bluebox.
He estimated that at risk was 99% of devices running Android, but evidence that the hackers took advantage of vulnerability, the company does not.
Bluebox informed about the threat of Google in April this year – after the U.S. Internet company has released an update Android. Therefore at risk are those who still have not downloaded the new version of the mobile software.
eve of the Minister of Communications and Mass Communications of the Russian Federation Nikolai Nikoforov suggested Apple and SAP reveal their source codes of the Russian state art. “The revelations of Edward Snowden in 2013 and public statements of U.S. intelligence to strengthen surveillance of Russia in 2014 raised the question seriously the confidence of foreign software and hardware – said Nikiforov. – It is obvious that those companies that disclose the source code of their programs, nothing hide, but those who did not intend to cooperate with Russia on this issue may have undeclared capabilities in their products “.
Nikiforov previously reported transition government with the iPad on the device by Samsung. According to him, this is not any restriction or sanctions against the American company Apple.
Previously, members of the government at Cabinet meetings and meetings used iPad, but now at meetings began to use Samsung’s Tablets . “This specially protected devices that can be used to handle confidential information. Certain information at government meetings are confidential, and these devices (Samsung) fully comply with these requirements and have passed the most stringent certification system”, – said Nikiforov.
No comments:
Post a Comment