Summary:Malware that cannot be uninstalled by the end user is being pre-loaded onto some cheap Android smartphones at an unknown point in the supply chain.
Malware that cannot be uninstalled by the end user is being pre-loaded onto some cheap Android smartphones.
12 essential Microsoft business apps for the iPhone
As part of Microsoft's "mobile first, cloud first" mission, it has built up a large portfolio of consumer and business apps on every platform. In this roundup, I look at a dozen iOS apps that help IT pros and power users stay productive with an iPhone and Microsoft services.
The malware, called DeathRing, is a Chinese Trojan that masquerades as a ringtone app. However, it has the capability to download SMS and WAP content from its control server to the user's handset. This gives it the potential to phish victim's personal information through the use of fake text messages.
The malware is pre-loaded into the system directory of the handsets at an unknown point within the supply chain.
This malware cannot be removed by antimalware software or the end user.
The handsets affected are devices from third-tier manufacturers selling smartphones to developing countries. According to security firm LookOut the following handsets are affected:
Counterfeit Samsung GS4/Note IIVarious TECNO devicesGionee Gpad G1Gionee GN708WGionee GN800Polytron Rocket S2350Hi-Tech Amaze TabKarbonn TA-FONE A34/A37Jiayu G4S - Galaxy S4 CloneHaier H7No manufacturer specified i9502+ Samsung Clone
The main countries affected by the malware currently are Vietnam, Indonesia, India, Nigeria, Taiwan and China.
See also:
Adrian Kingsley-Hughes is an internationally published technology author who has devoted over a decade to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera.Adrian has authored/co-authored technic... Full Bio
zdnet_core.socialButton.googleLabel Follow @@the_pc_doc Contact Disclosure All opinions expressed on Hardware 2.0 are those of Adrian Kingsley-Hughes. Every effort is made to ensure that the information posted is accurate. If you have any comments, queries or corrections, please contact Adrian via the email link here. Any possible conflicts of interest will be posted below. [Updated: February 23, 2010] - Adrian Kingsley-Hughes has no business relationships, affiliations, investments, or other actual/potential conflicts of interest relating to the content posted so far on this blog.
View the original article here
Malware that cannot be uninstalled by the end user is being pre-loaded onto some cheap Android smartphones.

12 essential Microsoft business apps for the iPhone
As part of Microsoft's "mobile first, cloud first" mission, it has built up a large portfolio of consumer and business apps on every platform. In this roundup, I look at a dozen iOS apps that help IT pros and power users stay productive with an iPhone and Microsoft services.
The malware, called DeathRing, is a Chinese Trojan that masquerades as a ringtone app. However, it has the capability to download SMS and WAP content from its control server to the user's handset. This gives it the potential to phish victim's personal information through the use of fake text messages.
The malware is pre-loaded into the system directory of the handsets at an unknown point within the supply chain.
This malware cannot be removed by antimalware software or the end user.
The handsets affected are devices from third-tier manufacturers selling smartphones to developing countries. According to security firm LookOut the following handsets are affected:
Counterfeit Samsung GS4/Note IIVarious TECNO devicesGionee Gpad G1Gionee GN708WGionee GN800Polytron Rocket S2350Hi-Tech Amaze TabKarbonn TA-FONE A34/A37Jiayu G4S - Galaxy S4 CloneHaier H7No manufacturer specified i9502+ Samsung Clone
The main countries affected by the malware currently are Vietnam, Indonesia, India, Nigeria, Taiwan and China.
See also:

Adrian Kingsley-Hughes is an internationally published technology author who has devoted over a decade to helping users get the most from technology -- whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or digital camera.Adrian has authored/co-authored technic... Full Bio
zdnet_core.socialButton.googleLabel Follow @@the_pc_doc Contact Disclosure All opinions expressed on Hardware 2.0 are those of Adrian Kingsley-Hughes. Every effort is made to ensure that the information posted is accurate. If you have any comments, queries or corrections, please contact Adrian via the email link here. Any possible conflicts of interest will be posted below. [Updated: February 23, 2010] - Adrian Kingsley-Hughes has no business relationships, affiliations, investments, or other actual/potential conflicts of interest relating to the content posted so far on this blog.
View the original article here
No comments:
Post a Comment