VnutZ Domain
Copyright © 1996 - 2019 [Matthew Vea] - All Rights Reserved

2010-08-02
Featured Article

Android Rootkit

[index] [840 page views]
Tagged As: Hacking, Mobile, and Security

Smartphones are definitely taking the mobile handset market by storm, especially with the success of the iPhone and Android platforms expanding into the personal device realm. As with any device that gains in popularity, it soon becomes the target of hackers - either for zero day bragging rights or for more nefarious purposes. At DEFCON 18, Nicholas J. Percoco unveiled a proof of concept rootkit aimed at Android. The code allows an external party to trigger the sleeping rootkit into initiating a TCP connection from the device. In a nutshell, simply by receiving a covert call, the device can be used to exfiltrate its data or in more advanced forms, enabled as a remote monitoring device, etc. Rootkits are a different breed of security threat than viruses, worms or Trojans; properly written, they allow a hacker to re-access a computer system with full privileges, perform tasks in secret and depart the system without leaving a trace of the access.



More site content that might interest you:

Imagine a camera that can take a picture of something that it cannot directly see.


Try your hand at fate and use the site's continuously updating statistical analysis of the MegaMillions and PowerBall lotteries to choose "smarter" number. Remember, you don't have to win the jackpot to win money from the lottery!


Tired of social media sites mining all your data? Try a private, auto-deleting message bulletin board.