Month: January 2017

FortinetSecurity

Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer


Recently, we found a new Android rootnik malware which uses open-sourced Android root exploit tools and the MTK root scheme from the dashi root tool to gain root access on an Android device. The malware disguises itself as a file helper app and then uses very advanced anti-debug and anti-hook techniques to prevent it from being reverse engineered. It also uses a multidex scheme to load a secondary dex file. After successfully gaining root privileges on the device, the rootnik malware can perform several malicious behaviors, including app and ad…

Read More
ComputerWorldIndependent

Self-protection is key to Linux kernel security

Linux has quietly taken over the world. The operating system now powers the large datacenters that make all our cloud applications and services possible, along with billions of Android devices and internet-connected gadgets that comprise the internet of things (IoT). Even the systems that handle the day-to-day operations on the International Space Station run Linux.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More
ComputerWorldIndependent

Face-off: Oracle vs. CA for identity management

Employees come and go, or switch departments, so IT managers seek an automated way to give (or deny) them access privileges to corporate systems. Two of the top software products for identity and access management (IAM) are Oracle Identity Manager and CA Identity Manager, according to IT Central Station, an online community where IT professionals review enterprise products.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More

(Insider Story)

Read More
ComputerWorldIndependent

Report: Trump still uses his unsecured Android phone to tweet

President Trump is still tweeting from his old Android phone in the White House, even after being given a new, secure device just before his inauguration, according to a report in The New York Times.

That revelation stirred some strong negative reactions from three mobile security analysts contacted on Thursday. Two of those analysts said using the older Android device only for tweeting doesn’t necessarily pose a national security risk, but they questioned what else he might be doing with that Android device that could pose such risks.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

Will 2017 be the Year IoT Threats Go Mainstream?

The Internet of Things (IoT) is changing the way we live and work forever. It makes us more productive, healthier and happier, and it enables businesses to work smarter, more efficiently and with greater agility. There’s just one problem: from a security perspective IoT devices are fundamentally flawed. And the bad guys are getting pretty…

Read More
ComputerWorldIndependent

10 questions to ask IDaaS vendors before you buy

Identity as a service (IDaaS), also known as identity and access management as a service, uses a cloud infrastructure for securely managing user identities and access enforcement. At its most basic level, IDaaS enables single sign-on (SSO) for systems in the cloud or on-premises, but it goes well beyond that to include access provisioning and deprovisioning, governance and analytics.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More