Sunday, 18 May 2014

Run Android Applications on PC via Android SDK Manager

Do you wish to run Android application or games but don’t have a Smartphone to do it? Well, we would in this tutorial unleash a method by which you can run Android applications on your own PC. So, let’s started then……..
1. You need to at first download Android Sdk which you can by clicking here. Note: download the 16-bit or 32-bit version according to your PC.
2. Now install the program and a screen like below will appear:
android-sdk-manager 3. Now, check the latest version of Android that you would like to use for applications and then click on install packages.
4. After installing the packages, go to your web browser and download any of your favorite android application to your PC. But, while installing it copy the files where you have installed the Android SDK.
5. Then open the android-sdk-windows and from their Android virtual device manager. Their click on new and click on the path when you have in the previous step installed copied the files.
android-Virtual-Device-manager 
6. After this, click on start and it will ask if you want to change the screen settings of your android mobile after doing it your android mobile will run. But, Android emulator will run through where you installed the applications.
7. Now go to RUN and type cmd and press enter.
8. Now enter the path where you installed the Android SDK and press enter.
9. Then in the next command write the command which leads to platform tools for e.g cd android-sdk-windows\platform-tools\) writing cd here is necessary.
10. Now, in the next command write: adb -e install -r yourapp.apk and press enter.
11. After this you can the Android emulator and enjoy running applications.

WikiLeaks: About 80 Companies Cooperating With NSA; Intel, IBM, Microsoft Included

As if the Snowden revelations were not enough, we have yet another startling claim by WikiLeaks stating that nearly a hundred corporations colluded with NSA in its surveillance programs.
The tweet from WikiLeaks says,
“80 corporations have been bribed or coopted by NSA including Intel, CISCO, IBM, Oracle, Microsoft, AT&T, Qualcom”
The WikiLeaks have got hold of some NSA documents that has names of the corporations that collaborated with the intelligence agencies to snoop on digital data.
Image credit: PBS
Image credit: PBS
The obtained slides state about 80 ‘Major Global Corporations’ are supporting BOTH missions; however, there is no clear indication as to what ‘both missions’ stand for.
Taking a lead from the cue that the slide is labeled as COMINT, it can be safely inferred that ‘Both’ refer to communications between people.
Some of the listed companies include well-known global organizations, such as Telecommunications and Network Service Providers – AT&T, Verizon and Qwest (now part of Centurylink); Network Infrastructure – Cisco and HP; Hardware Platforms Desktops/Servers – HP, Intel, Qualcomm, IBM, EDS (now HP); Operating Systems – Microsoft; Applications Software – Oracle, EDS (now HP) and Microsoft; Security Hardware and Software – Cisco, Oracle, EDS (now HP); System Integrators – HP, IBM, Cisco and EDS (now HP)
This is the first time ever a documented list of company names engaged with NSA has been highlighted.
These companies had earlier refuted charges of working in collusion with the intelligence agencies when NSA’s PRISM activities were disclosed. Some of them even alleged being victimized or attacked by the government for refusing to cooperate with the intelligence agencies.
HackRead has many articles on companies–NSA association: refusal and charges.
While the information made public by WikiLeaks only corroborates the common men’s suspicion about the NSA and corporations working together, it is bit intriguing that WikiLeaks has not made public the full list of organizations. WikiLeaks is notoriously famous for making documents public that shames the US government.

Card Control app helps users protect their credit cards from hacking

card_control_app_screenshot_ndtv_ondot.jpg

Bad news for credit card hackers. Here comes a 'remote control' app that can help users turn their credit cards on and off with the click of a button, and also control when, where, and how they are used.Run by two Indian American entrepreneurs, a San Jose-based startup called OnDot Systems has unveiled an app named Card Control, which acts as a kind of 'remote control' for credit, debit, and prepaid cards.
The app requires no external hardware and no special credit cards.
"We sells Card Control directly to banks and credit card processors who offer it as a special service to their customers. OnDot collects a per-user licensing fee from the banks and processors," Rachna Ahlawat, CEO, OnDot was quoted as saying.
Selling directly to institutions and not to individuals was a careful decision, Vaduvur Bharghavan, founder of the company, noted.
"We tell the banks to offer this to your customers as a convenience," Bharghavan added.
OnDot has signed deals with four major credit card processors, who collectively process transactions for 10,000 banks and credit unions across the country, a report in wired.com said.
According to Verizon's 2014 Data Breach Investigations Report (DBIR), 2013 can be termed at the year of retailer breach and can also be considered as the year of transition from geopolitical attacks to large-scale attacks on payment card systems.
Verizon's DBIR report added that financially motivated attackers are hyper-focused on gaining access to the money, so it follows that their two primary target industries are the financial and retail industries (where data that easily converts to money is abundant and all too often, accessible).
"Within the financial industry, they focus on gaining access to the user interface of the web (banking) application more so than exploiting the web application itself, because the application grants logical access to the money. "This means they target user credentials and simply use web applications protected with a single factor (password) as the conduit to their goal," the report added.

Thursday, 15 May 2014

Fake Kaspersky Antivirus app found on Google Play, Windows Phone Store

While Google Play Store is able to prevent malicious applications from being uploaded to the market,  Google still fails to prevent cyber criminals from uploading fake apps.

Last Month, Android Police discovered a fake Antivirus app on Google Play going by the name of 'Virus Shield' which fooled thousands of users into buying this app.
Sponsored Links

The story of fake Antivirus apps doesn't stop there.  Today, Experts at Kaspersky have discovered one more fake Antivirus app going by the name of 'Kaspersky Anti-virus 2014' on Google Play.

The fake version of Kaspersky was being sold for $4 that does nothing other than displaying the Kaspersky Logo.

Researchers also discovered that few fake apps were being sold at Windows Phone Store.  Some of them are 'Mozilla Mobile', 'Kaspersky Mobile', 'Avira Antivir' and the 'Virus Shield' apps.

The fake version of Kaspersky antivirus app for Windows phone pretends to be scanning your device but does nothing.


Few weeks back, when i was searching for TrueCaller app for my Windows phone, i also came across a fake paid Version of TrueCaller and other apps.  After i reported to Microsoft, they removed those apps from the store.

Just now, I also found a fake version of COMODO Antivirus for the windows phone which is being sold for $1.49.  This fake app was uploaded by cheedella suresh( The name appears to be South Indian name).


As you can see, the developer has also uploaded few other fake apps in Windows phone store.  These apps have been uploaded in the recent months(April- May).

Fake Kaspersky Antivirus app found on Google Play, Windows Phone Store


While Google Play Store is able to prevent malicious applications from being uploaded to the market, Google still fails to prevent cyber criminals from uploading fake apps.

Last Month, Android Police discovered
a fake Antivirus app on Google Play going by the name of 'Virus Shield' which fooled thousands of users into buying this app.
The story of fake Antivirus apps doesn't stop there. Today, Experts at Kaspersky have discovered
one more fake Antivirus app going by the name of 'Kaspersky Anti-virus 2014' on Google Play.

The fake version of Kaspersky was being sold for $4 that does nothing other than displaying the Kaspersky Logo.

Researchers also discovered that few fake apps were being sold at Windows Phone Store. Some of them are 'Mozilla Mobile', 'Kaspersky Mobile', 'Avira Antivir' and the 'Virus Shield' apps.

The fake version of Kaspersky antivirus app for Windows phone pretends to be scanning your device but does nothing.


Few weeks back, when i was searching for TrueCaller app for my Windows phone, i also came across a fake paid Version of TrueCaller and other apps. After i reported to Microsoft, they removed those apps from the store.

Just now, I also found a fake version of COMODO Antivirus for the windows phone which is being sold for $1.49. This fake app was uploaded by cheedella suresh( The name appears to be South Indian name).


As you can see, the developer has also uploaded few other fake apps in Windows phone store. These apps have been uploaded in the recent months(April- May).

Wednesday, 14 May 2014

Bitly website hacked, accounts credentials compromised


Bitly(bit.ly), the Popular URL shortening service, has issued an urgent security warning about a security breach that exposed account's credentials.

The company says they found no evidence suggesting that any accounts have been accessed by the intruders.  However, as a precaution, the company has disconnected users' facebook and twitter accounts.

"We invalidated all credentials within Facebook and Twitter" the blog post reads.

Although the social media accounts appear to be connected with bitly account,  users won't be able to publish anything until they reconnect the accounts. 

Users are advised to take the following steps to reset their OAuth tokens and API Keys:

1) Log in to your account and click on ‘Your Settings,’ then the ‘Advanced’ tab.

2) At the bottom of the ‘Advanced’ tab, select ‘Reset’ next to ‘Legacy API key.’

3) Copy down your new API key and change it in all applications. These can include social publishers, share buttons and mobile apps.

4) Go to the ‘Profile’ tab and reset your password.

5) Disconnect and reconnect any applications that use Bitly. You can check which accounts are connected under the ‘Connected Accounts’ tab in ‘Your Settings.’
Bitly says "they have already taken proactive measures to secure all paths that led to the compromise". 

Be careful when You Browse Adult contents in your Android phone



CryptoLocker Ransomware which is so far making trouble for Desktop users by scaring them into pay a fine to unlock their locked hard devices is now started to target Android users.

BitDefender have identified a new mobile version of the Ransomware which is being sold by the same group responsible for the Desktop version of Ransomware malware.

The malware dubbed as 'Android.Trojan. Koler.A' is being served to the mobile devices, when the users are browsing certain adult content websites.

The malware disguise itself as badoink, a video player that needs to be installed to get premium access to porn and tricks users into installing the app.

Once installed, the malware finds the location of victims and shows a fake warning message in their local language.

"Attention! Your Phone has been blocked up for safety reasons listed below.  All the action peformed on this phone are fixed.  All your files are encrypted.  Conducted Audio and Video" The fake message reads.

The warning message informs the victims that their files have been encrypted and they have to pay $300 ransom in order to unlock their device. 

But, No Need to Panic ! The files stored on the device are not actually encrypted as the warning message claims.  By pressing Home button, you can return to Home screen. You will have 5 seconds to Uninstall the app from your device.

Safe Mode to Remove the malicious app:
This malicious app is Not Sophisticated one, you can uninstall the app by booting the device in Safe Mode.

"The group behind this exploit is falsely and egregiously using the BaDoink
brand and logo, a brand that adult consumers have trusted for 8 years, to
spread this Ransomware."In an email sent to us, the company behind the legitimate version of Badoink, has clarified that they've nothing to do with this ransomware.

Monday, 12 May 2014

Snoopy drone can hack your smartphone when you’re on street

snoopy-drone-hack-smartphones
Snoopy is a distributed tracking and profiling framework.
According to the British experts from Sensepost Security, the project called Snoopy demonstrates the danger of using drones without clear rules.
Sensepost created a distributed tracking and data interception framework, which performs simple tracking, real-time and historical profiling of devices and the peoples who own them. So it’s perhaps worth mentioning that Snoopy is a distributed framework compromised of various existing technologies.
How does it works?
Drones were the main stars of CES 2014 that took earlier this year in Las Vegas. New York mayor said since last year that drones will arrive in equipping police in the American metropolis.
Snoopy Drone will search for WiFi enabled devices and then using its built-in technology, it will see what networks the phones have accessed in the past and pretends to be one of those old network connections. More exactly, the Drone will use Wireless Evil Twin Attack to hack Smartphones. This attack consists in spoofing WiFi networks that the device has already accessed.
What can you do with such a drone? How dangerous is it?
This kind of attacks will allow the attacker to remote control your mobile phone or tablet. The hackers can do everything with your smartphone once they get full access to it. Researchers have successfully stolen Amazon, PayPal, and Yahoo credentials while testing it out in London. The drone hacked over 150 smartphones in one hour.
Below you can see the diagram of the Snoopy Framework’s Architecture:
snoopy-framework-architecture
The diagram is explained on the Sensepost’s official blog.
For more techical details regarding Snoopy Framework, please see this Github Page.
You can see how Snoopy Drone works by watching the following video:

https://www.youtube.com/watch?v=RIwXB7bNQCs

Popular Posts