CDF

Categories
    • android tips 35
    • Blogger Tips 33
    • Blogging 49
    • Blogging tips 20
    • Browsing tips 53
    • codings 27
    • E-dinar 9
    • earnings 33
    • educational 13
    • Games 8
    • hacking 16
    • Hacking Tips 7
    • how to 120
    • HTML 14
    • info 99
    • JavaScript's 15
    • Konga tips 3
    • Mobile 39
    • mp3 1
    • PC tips 17
    • school gist 7
    • seo tutorials 14
    • Social media 16
    • software 27
    • tech 20
    • templates 2
    • tutorials 105
    • updates 161
    • Vpn tips 2
    • WiFi hacking tutorials 3
Dark
Contact Us
ProfilMain Page
  • About us
  • Sponsored
  • Disclaimer
  • Privacy Policy

Showing posts from July 22, 2016

Views Style:
Android app ambush: Researchers successfully hack Gmail 9 times out of 10

Android app ambush: Researchers successfully hack Gmail 9 times out of 10

android tips No comments
How to Program a Fairly Simple Hacking Batch or Bat File

How to Program a Fairly Simple Hacking Batch or Bat File

codings No comments
Load more posts

Trending Post

  • Instructions to Automatically add Read More connection to Blogger
    Instructions to Automatically add Read More connection to Blogger
  • instructions to put a blogger widget inside a scroll box
    instructions to put a blogger widget inside a scroll box
  • The most effective method to Pay Or Receive Payments With mCash
    The most effective method to Pay Or Receive Payments With mCash
  • Download Website Organic Traffic Ebook Here
    Download Website Organic Traffic Ebook Here
  • AdSense Ads Not Showing On HomePage - Problem Solved
    AdSense Ads Not Showing On HomePage - Problem Solved
Email Subscription

Android app ambush: Researchers successfully hack Gmail 9 times out of 10

  • Get link
  • Facebook
  • X
  • Pinterest
  • Email
  • Other Apps
Oleh bcoded - July 22, 2016

If we've said it once, we've said it a thousand times: Be careful about the apps your download unto your android phone. A trio of researchers say they've discovered a new way to use a malicious android app to nab critical information on an Android phone, such as login details, social security numbers, and images of checks for deposit.

Researchers Zhiyun Qian, of the University of California, Riverside, and Z. Morley Mao and Qi Alfred Chen from the University of Michigan are set to present their findings during the Usenix Security Symposium in San Diego on Friday.
The attack works by having a malicious app monitor actions on a phone and wait for the user to open and start using a target app, such as Gmail, H&R Block, or Chase Bank. The bad app then exploits data in shared memory to basically make an educated guess about what a user is doing on the other app at that exact moment.
The malicious app can then attempt to retrieve whatever data the user is entering into the target app by injecting a fake login screen before the real one appears. This is known as a phishing attack and is a very common way for hackers to steal sensitive data.


But phishing isn't the only attack the researchers used to nab data. In one of several videos examples the researcher posted online, a target phone attempts to deposit a check by snapping a picture of it in the Chase Bank app. The malicious app is then able to grab a check image and send it to the attacker's phone.
This bit of trickery again relies on some educated guesswork via shared memory, but doesn't use a phishing attack. When a smartphone takes a picture, you can look at your device screen and preview as a video stream whatever the camera is pointed at. The malicious app is able to grab frames of this video stream while your camera is in preview mode. In the case of Chase Bank, the app is again guessing that you are lining up your camera to take a shot of a check.
The attack method sounds pretty ominous owing to the kind of information it could grab, but it does come with some major caveats.
First, you have to download a malicious app to start monitoring your activity . Then, the attack has to happen at the exact moment you are entering sensitive information or snapping a picture containing sensitive data 
(like that check photo).
Second, because stealing credentials ultimately relies on a phishing attack, the malicious app has to inject a phony, look-alike login screen without the user noticing. That means the fake screen has to be precisely timed. The fake login screen should also be very exactly designed to match the normal login screen—although some people will trust almost any screen they see on their phone or PC.
Despite its seeming complexity, the researchers say their success rate was quite high testing their attack with 10 volunteers who were asked to interact with the app—the volunteers did not login into the phones with their own information.
The researchers say that during the tests they succeeded at hacking Gmail and H&R Block 92 percent of the time, as well as Newegg (86 percent), WebMD (85 percent), CHASE Bank (83 percent), and Hotels.com (83 percent). 
The only app of the seven that showed serious resistance was Amazon's shopping app with attacks successful only 48 percent of the time.
The researchers also claim these attacks are possible on other operating systems such as iOS and Windows as they all use shared memory mechanisms.
Since the attack sounds fairly difficult, we've asked a few security experts to weigh in on how likely it would be for this attack scenario to succeed in the wild. We'll update this post should they respond.

Timo Hirvonen, senior researcher at security firm F-Secure, shared his thoughts with us about this new attack. Although the attack sounds difficult to pull off, Hirvonen told us, it wouldn't be—even though some parts of the attack need to be tailored for specific apps.
"I hope malware authors don’t read academic papers since I could see at least some elements being very useful in a practical malware attack," Hirvonen said. 
Whether or not you're likely to succumb to an attack such as this it's always a good reminder to be very careful about the apps you load onto your phone—especially if you' are sideloading apps from unofficial sources.
With this article am sure by now we will be able to know the ways hackers penetrate our information details. Credit card, logins, email detail etc...
Kindly drop your comments below!
Read more
Post a Comment
Nhãn : android tips info Social media updates

How to Program a Fairly Simple Hacking Batch or Bat File

  • Get link
  • Facebook
  • X
  • Pinterest
  • Email
  • Other Apps
Oleh bcoded - July 22, 2016

This tutorials will show you how to program a fairly simple hacking bat file.

*first open notepad

*paste the below code into notepad !






Note: after you have done that
*save the file as 
*rarhacker.bat
*make sure your file have the.bat at the end.
Enjoy!



You may also like how to infect a wapka site using HTML|javascripts
Read more
Post a Comment
Nhãn : codings hacking PC tips tutorials
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)
Powered by Blogger

Report Abuse

Search This Blog

Archive

  • Feb 151
  • Feb 021
  • Jan 301
  • Jan 241
  • Jan 191
  • Jan 131
  • Jan 121
  • Jan 081
  • Jan 051
  • Jan 021
  • Dec 311
  • Dec 271
  • Dec 201
  • Dec 181
  • Dec 131
  • Dec 121
  • Dec 101
  • Dec 081
  • Dec 061
  • Dec 052
  • Dec 041
  • Nov 281
  • Nov 271
  • Nov 261
  • Nov 241
  • Nov 221
  • Nov 211
  • Nov 191
  • Nov 181
  • Nov 172
  • Nov 161
  • Nov 151
  • Nov 141
  • Nov 111
  • Nov 101
  • Nov 082
  • Nov 071
  • Nov 061
  • Nov 031
  • Nov 011
  • Oct 311
  • Oct 301
  • Oct 281
  • Oct 271
  • Oct 231
  • Oct 201
  • Oct 181
  • Oct 162
  • Oct 152
  • Oct 141
  • Oct 121
  • Oct 102
  • Oct 081
  • Oct 071
  • Oct 061
  • Oct 042
  • Oct 022
  • Oct 011
  • Sept 292
  • Sept 281
  • Sept 261
  • Sept 251
  • Sept 221
  • Sept 212
  • Sept 192
  • Sept 182
  • Sept 162
  • Sept 151
  • Sept 131
  • Sept 121
  • Sept 111
  • Sept 102
  • Sept 091
  • Sept 082
  • Sept 072
  • Sept 062
  • Sept 051
  • Sept 041
  • Sept 031
  • Sept 012
  • Aug 311
  • Aug 302
  • Aug 291
  • Aug 282
  • Aug 271
  • Aug 261
  • Aug 251
  • Aug 241
  • Aug 231
  • Aug 222
  • Aug 212
  • Aug 201
  • Aug 192
  • Aug 182
  • Aug 171
  • Aug 162
  • Aug 152
  • Aug 144
  • Aug 131
  • Aug 123
  • Aug 112
  • Aug 102
  • Aug 093
  • Aug 081
  • Aug 075
  • Aug 062
  • Aug 055
  • Aug 044
  • Aug 033
  • Aug 022
  • Aug 011
  • Jul 308
  • Jul 297
  • Jul 2812
  • Jul 275
  • Jul 267
  • Jul 251
  • Jul 242
  • Jul 232
  • Jul 222
  • Jul 211
  • Jul 205
  • Jul 194
  • Jul 186
  • Jul 173
  • Jul 167
  • Jul 156
  • Jul 145
  • Jul 1310
  • Jul 127
  • Jul 117
  • Dec 201
Show more Show less

ADVERTISMENT



Copyright © 2015 - 2017 Blog Indoor | Designed with by
Fancybloggertricks
About Us | Sitemap | Hire Us | Privacy & Policy | Advertise | Sitemap | Write For Us | Sponsor A Post | Own A Site | Disclaimer

SEARCH BLOGINDOOR

SUBSCRIBE TO OUR POST

Subscribe With Us!
Why should I subscribe?
  • ✔
    For Latest Free Browsing Tweaks
  • ✔
    Android & PC Tutorials
  • ✔
    Tech News & HOW TOs
  • ✔
    All Straight into your → INBOX
Safe With Us | Privacy Policy

Pages

  • Home

Recent Updates


⚠ WARNING: Every advert left on comment section of this blog are not endorsed by 9jaentbaze,they are scam.


Home | About us | privacy-policy | contact us | Sponsored Post
Disclaimer

© Copyright 2019" 9jaentbbaze 2019 · All Rights Reserved · And Our Sitemap · All Logos and Trademark Belongs To Their Respective Owners·