Malicious Apps Brought Ad-Clicking 'Judy' Malware To Millions Of Android Phones Slashdotby EditorDavid on android at January 1, 1970, 1:00 am (cached at May 28, 2017, 11:34 pm)

An anonymous reader quotes Fortune: The security firm Checkpoint on Thursday uncovered dozens of Android applications that infected users' devices with malicious ad-click software. In at least one case, an app bearing the malware was available through the Google Play app store for more than a year. While the actual extent of the malicious code's spread is unknown, Checkpoint says it may have reached as many as 36.5 million users, making it potentially the most widely-spread malware yet found on Google Play... The nefarious nature of the programs went unnoticed in large part, according to Checkpoint, because its malware payload was downloaded from a non-Google server after the programs were installed. The code would then use the infected phone to click on Google ads, generating fraudulent revenue for the attacker.

Read more of this story at Slashdot.

Malicious Apps Brought Ad-Clicking 'Judy' Malware To Millions Of Android Phones Slashdotby EditorDavid on android at January 1, 1970, 1:00 am (cached at May 28, 2017, 11:34 pm)

An anonymous reader quotes Fortune: The security firm Checkpoint on Thursday uncovered dozens of Android applications that infected users' devices with malicious ad-click software. In at least one case, an app bearing the malware was available through the Google Play app store for more than a year. While the actual extent of the malicious code's spread is unknown, Checkpoint says it may have reached as many as 36.5 million users, making it potentially the most widely-spread malware yet found on Google Play... The nefarious nature of the programs went unnoticed in large part, according to Checkpoint, because its malware payload was downloaded from a non-Google server after the programs were installed. The code would then use the infected phone to click on Google ads, generating fraudulent revenue for the attacker.

Read more of this story at Slashdot.

Philippines calls off peace talks with Communist rebels AL JAZEERA ENGLISH (AJE)(cached at May 28, 2017, 11:30 pm)

Negotiations broke down over rebel order for fighters to step up attacks amid violence and martial law in the south.
US 'might' expand laptop ban to all flights AL JAZEERA ENGLISH (AJE)(cached at May 28, 2017, 11:30 pm)

Laptop ban on all flights into and out of US could be part of a new security measure, Homeland Security Secretary says.
Philippines calls off peace talks with Communist rebels AL JAZEERA ENGLISH (AJE)(cached at May 28, 2017, 11:30 pm)

Negotiations broke down over rebel order for fighters to step up attacks amid violence and martial law in the south.
US 'might' expand laptop ban to all flights AL JAZEERA ENGLISH (AJE)(cached at May 28, 2017, 11:30 pm)

Laptop ban on all flights into and out of US could be part of a new security measure, Homeland Security Secretary says.
New Privacy Vulnerability In IOT Devices: Traffic Rate Metadata Slashdotby EditorDavid on networking at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:34 pm)

Orome1 quotes Help Net Security: Even though many IoT devices for smart homes encrypt their traffic, a passive network observer -- e.g. an ISP, or a neighborhood WiFi eavesdropper -- can infer consumer behavior and sensitive details about users from IoT device-associated traffic rate metadata. A group of researchers from the Computer Science Department of Princeton University have proven this fact by setting up smart home laboratory with a passive network tap, and examining the traffic rates of four IoT smart home devices: a Sense sleep monitor, a Nest Cam Indoor security camera, a WeMo smart outlet, and an Amazon Echo smart speaker... "Once an adversary identifies packet streams for a particular device, one or more of the streams are likely to encode device state. Simply plotting send/receive rates of the streams revealed potentially private user interactions for each device we tested," the researchers noted. [PDF] In addition, the article notes, "Separating recorded network traffic into packet streams and associating each stream with an IoT device is not that hard."

Read more of this story at Slashdot.

New Privacy Vulnerability In IOT Devices: Traffic Rate Metadata Slashdotby EditorDavid on networking at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:34 pm)

Orome1 quotes Help Net Security: Even though many IoT devices for smart homes encrypt their traffic, a passive network observer -- e.g. an ISP, or a neighborhood WiFi eavesdropper -- can infer consumer behavior and sensitive details about users from IoT device-associated traffic rate metadata. A group of researchers from the Computer Science Department of Princeton University have proven this fact by setting up smart home laboratory with a passive network tap, and examining the traffic rates of four IoT smart home devices: a Sense sleep monitor, a Nest Cam Indoor security camera, a WeMo smart outlet, and an Amazon Echo smart speaker... "Once an adversary identifies packet streams for a particular device, one or more of the streams are likely to encode device state. Simply plotting send/receive rates of the streams revealed potentially private user interactions for each device we tested," the researchers noted. [PDF] In addition, the article notes, "Separating recorded network traffic into packet streams and associating each stream with an IoT device is not that hard."

Read more of this story at Slashdot.

Android-Build-2017.528 search.cpan.orgby Philip R Brenan at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:07 pm)

Compile, install, start an Android App using the sdk command line build tools rather than calling them via ant or gradle.
Android-Build-2017.528 search.cpan.orgby Philip R Brenan at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:07 pm)

Compile, install, start an Android App using the sdk command line build tools rather than calling them via ant or gradle.
App-EvalServerAdvanced-0.012 search.cpan.orgby Ryan Voots at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:07 pm)

A more featured update to App::EvalServer
App-EvalServerAdvanced-0.012 search.cpan.orgby Ryan Voots at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:07 pm)

A more featured update to App::EvalServer
CallBackery-0.10.8 search.cpan.orgby Tobias Oetiker at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:07 pm)

CallBackery is a Mojolicious+Qoodoo Framework for building Web Applications
CallBackery-0.10.8 search.cpan.orgby Tobias Oetiker at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:07 pm)

CallBackery is a Mojolicious+Qoodoo Framework for building Web Applications
Pcore-PDF-v0.3.7 search.cpan.orgby Dmytro Zagashev at January 1, 1970, 1:00 am (cached at May 28, 2017, 10:07 pm)

non-blocking HTML to PDF converter