If you are a person with visual impairments, navigate the site from here < class=”floatFix” id=”navegadorSitiosTop”>
- HOME
- LATEST NEWS
- SECTIONS Buenos AiresDeportesTecnologíaEspectáculosPersonajes.tvPolíticaEconomíaSociedadSeguridadEl World
- OPINIÓNEditorialesColumnistas of hoyTodos the columnistasCarta of lectoresTodas notes Opinion
- PRINT EDITION Kiosk LNCampoEnfoquesComercio ExteriorPropiedadesInmuebles ComercialesCountriesAll titles Supplements LN RevistaSábadoModa and BellezaTurismoAl volanteAdn CulturaComunidadHumorCriptograma literaryWarnings: Funeral – Social – Solidarity
- BLOGS
- LN DATA
- SERVICIOSPronóstico of tiempoEstado of tránsitoHoróscopo Today Sudoku onlineLoterías and quinielasHorarios of vuelosFeriados 2013Dólar and dollar blue hoyGrilla tvArchivoNewsletter Alerts SMSRSSVersión text only LN on your deviceNotices Alerts fúnebresSociales
|
Solidarity
- Guide NATION RestaurantesCineTeatro
2:30 |
1:34 |
1:00 |
Advance.
Last time:
received by mail news impacting
Technology
A security firm claims that a security hole threatens almost any Android device, and allows the installation of malicious code, but most of the users is out of danger
On Wednesday the firm Bluebox published a text warning of a security hole existed since version 1.6 of Android, and would allow the installation of malicious code without the user noticing, modifying the code of a installation file, but without changing its signature.
The bad news is that this hole, under this signature, persists in the latest versions of Android. And it could also enable a
The good: only affects (potentially) to applications that are installed on the outside of Play, the store of Google, which itself is updated and is able to detect this type of malware.
Some teams have also been updated to protect users from these attacks (the Galaxy S4, as told investigators the site IDG) but those that appeal to app stores third parties (notably, many of the devices from China that have not been certified by Google) remain vulnerable.
Bluebox say alerted Google last February, and that will give more details on this security hole at the Black Hat conference, later this month.
Symantec study published last March (which can be read in this PDF) shows that Android (by popularity and openness) is the focus of malware developers, but Apple’s iOS added this year documented vulnerabilities. .
http://www.lanacion.com.arTecnología
00:16
24 JUN
A future where password is your body
A tattoo identifier and a pill were the arrangements made by Motorola to avoid storing keys and so replace the usual ritual of entry to computer systems
http://www.lanacion.com.arTecnología
2:52
10 JUN
Three services to keep track of your phone or tablet
are applications that allow you to track the computer if it is lost or stolen, as well as delete your data remotely
http://www.lanacion.com.arTecnología
13:00
24 MAY
Guide to managing your Internet passwords
Tips when securely manage and easy key access from manager applications password to use text messaging to enter an online service
http://www.lanacion.com.arTecnología
14:27
21 MAY
A virus spreads among Skype contacts
Under the modality of worm, the threat began to spread among users in Latin America with messages of social engineering accompanied by a website link shortened, according to a report from ESET
http://www.lanacion.com.arTecnología
15:32
04 MAR
If do you use the notebook online Evernote, you have to change the password
platform notes online for computers and mobile devices requested the password change to 50 million users after being victims of unauthorized access to accounts
AS SEEN OF TECHNOLOGY
Price
dollar:
in case you missed it
The comments posted are solely the responsibility of the authors and the consequences arising out of them can bring about legal sanctions. User who posts messages including any comments violate the rules will be removed and disqualified to comentar.Enviar a comment constitutes acceptance of Regulation
Your message is being processed in minutes will be entered into the comments of the note.
- Sitemap |
- Help |
- Terms |
- How to advertise |
- Work with us
- Pag Home
- Devices
- The Nation Digital canchallena.com | Personajes.tv | OhLaLa!
RollingStone | Brando | HELLO ! | Susana
Living | Maru | Locations | Garden - THE NATION Club THE NATION | How to Advertise
Subscribe to the journal | Masters in Journalism
Make Community | Foundation NATION - Dridco Cars and Motorcycles: DeMotores | Jobs Gumtree
Properties: Propertyindex | Dating Diversions
Classifieds: localnexo - Covedisa Online catalog: starphone
Club Wine: Bonvivir
Discounts: Agrupate.com
If you are a person with visual impairments, navigate the site from here < class=”floatFix” id=”navegadorSitiosTop”>
- HOME
- LATEST NEWS
- SECTIONS Buenos AiresDeportesTecnologíaEspectáculosPersonajes.tvPolíticaEconomíaSociedadSeguridadEl World
- OPINIÓNEditorialesColumnistas of hoyTodos the columnistasCarta of lectoresTodas notes Opinion
- PRINT EDITION Kiosk LNCampoEnfoquesComercio ExteriorPropiedadesInmuebles ComercialesCountriesAll titles Supplements LN RevistaSábadoModa and BellezaTurismoAl volanteAdn CulturaComunidadHumorCriptograma literarySERVICIOSPronóstico of tiempoEstado of tránsitoHoróscopo TodaySudoku onlineLoterías and quinielasHorarios of vuelosFeriados 2013Dólar and dollar blue hoyGrilla tvArchivoNewsletterAlertas SMSRSSVersión only textoLN on your deviceNotices Alerts fúnebresSociales
|
Solidarity
- Guide NATION RestaurantesCineTeatro
2:30 |
1:34 |
1:00 |
View all Latest NewsAdvance.
Last time:
received by mail news impacting
Friday July 5, 2013 | 01:00Technology
A security firm claims that a security hole threatens almost any Android device, and allows the installation of malicious code, but most of the users is out of danger
Vulnerability in Android is present in almost all computers that use it, but for the vast majority of users do not no danger. Photo: File
On Wednesday the firm Bluebox published a text warning of a security hole existed since version 1.6 of Android, and would allow the installation of malicious code without the user noticing, modifying the code of a installation file, but without changing its signature.
The bad news is that this hole, under this signature, persists in the latest versions of Android. And it could also enable a
The good: only affects (potentially) to applications that are installed on the outside of Play, the store of Google, which itself is updated and is able to detect this type of malware.
Some teams have also been updated to protect users from these attacks (the Galaxy S4, as told investigators the site IDG) but those that appeal to app stores third parties (notably, many of the devices from China that have not been certified by Google) remain vulnerable.
Bluebox say alerted Google last February, and that will give more details on this security hole at the Black Hat conference, later this month.
Symantec study published last March (which can be read in this PDF) shows that Android (by popularity and openness) is the focus of malware developers, but Apple’s iOS added this year documented vulnerabilities. .
last notes of
Computer Security
http://www.lanacion.com.arTecnología
00:16
24 JUN
A future where password is your body
A tattoo identifier and a pill were the arrangements made by Motorola to avoid storing keys and so replace the usual ritual of entry to computer systems
http://www.lanacion.com.arTecnología
2:52
10 JUN
Three services to keep track of your phone or tablet
are applications that allow you to track the computer if it is lost or stolen, as well as delete your data remotely
http://www.lanacion.com.arTecnología
13:00
24 MAY
Guide to managing your Internet passwords
Tips when securely manage and easy key access from manager applications password to use text messaging to enter an online service
http://www.lanacion.com.arTecnología
14:27
21 MAY
A virus spreads among Skype contacts
Under the modality of worm, the threat began to spread among users in Latin America with messages of social engineering accompanied by a website link shortened, according to a report from ESET
http://www.lanacion.com.arTecnología
15:32
04 MAR
If do you use the notebook online Evernote, you have to change the password
platform notes online for computers and mobile devices requested the password change to 50 million users after being victims of unauthorized access to accounts
MOST VIEWED OF TECHNOLOGY
ISSUES TODAY CedinWimbledonParo of trenesElecciones 2013La death Angeles RawsonPrice
dollar:in case you missed it
The comments posted are solely the responsibility of the authors and the consequences arising out of them can bring about legal sanctions. User who posts messages including any comments violate the rules will be removed and disqualified to comentar.Enviar a comment constitutes acceptance of Regulation
Your message is being processed, in minutes will be entered into the comments of the note.
- Sitemap |
- Help |
- Terms |
- How to advertise |
- Work with us
- Pag Home
- Devices
- The Nation Digital canchallena.com | Personajes.tv | OhLaLa!
RollingStone | Brando | HELLO ! | Susana
Living | Maru | Places | Properties: Classifieds: Club Wine: Discounts:
No comments:
Post a Comment