6 C
London
Monday, November 20, 2017
Home Tags Nexus 6P

Tag: Nexus 6P

Google finally brings a somewhat affordable phone back to Project Fi.
Google partners with Nabisco, ships code to AOSP, and posts system images.
Booby-trapped touchscreens can log passwords, install malicious apps, and more.
This charging cable from Vastarnbsp;features micro and mini USB, 30-pin and lightning connectors, making it compatible with a very wide range of newer and older smartphones, tablets, USB devices and more. Equipped with a connector for iPhone 6/6 plus, 5/5s, iPad4, iPad Air, iPad mini, USB type C for Nexus 6P, Nexus 5X, Oneplus 2, 2015 MacBook with 12" Retina Display, 2015 Google Chromebook Pixel. Micro USB connector charge for most android phones, Bluetooth headset, external batteries; Mini USB connector for some additional mobile phone models, MP3, digital cameras or other devices.

The list price on this cable has been reduced 45% to just $5.99.
See it on Amazon.To read this article in full or to leave a comment, please click here
The fourth O preview will hopefully fix some bugs, marks stable support library release.
Available for newer Pixel and Nexus devices, final version will be out this fall.
"When the bootlooping occurs, the phone is essentially a very expensive paperweight."
The Pixel C gets the Pixel skin and a new recent apps screen; everyone else gets bug fixes.
New bugfixes for Google devices foreshadow the end for the Nexus 6 and 9.
At the 2016 mobile Pwn2Own event, held on Oct. 26 in Tokyo, security researchers were able to exploit devices that vendors had fully patched.
In total, Trend Micro's Zero Day Initiative (ZDI) awarded $215,000 to researchers for security flaws in an And...
Keen hackers at Mobile Pwn2Own The Nexus 6P appears to have been hacked with attackers at the Mobile Pwn2Own contest installing malware without user interaction in less than five minutes. The hack by China's Keen Team happened minutes ago at the Tokyo event and does not require users to do anything. It is as of the time of writing yet to be confirmed but contest organisers tell El Reg they are confident of its legitimacy. Mobile Pwn2Own at the PacSec security conference in Japan pits hackers against the latest phones for a share of US$375,000 (£308,000, A$487,000) handed out by Trend Micro's Zero Day Initiative. The Nexus 6P, Apple iPhone 6S, and Samsung Galaxy S7 will be targeted by hackers who have over previous months developed tailored and often highly-sophisticated chained exploits against the device. Hackers of noted exploit crew Keen Team stand to win US$100,000 (£82,000, A$130,000) in prizes should the 6P hack be confirmed. MWR Labs hackers Robert Miller and Georgi Geshev will within hours also target the Nexus 6P in a bid to install a malicious application, and will score the US$100,000 prize even if Keen's exploit is confirmed. Keen will also target the iPhone 6S attempting to install another rogue application on the stock and updated device for a prize of US$125,000 (£103,000, A$162,000) The team will then return in a bid to rip photos from a locked iPhone 6S.
If successful the crew will bag US$50,000 (£41,000, A$65,000). Each team under the contest rules has five minutes, over three attempts for a total of 20 minutes to pop devices. Keen hacked the Nexus 6P on its first attempt and used the remaining slots to add flair and style to the exploits in a bid to claim the Master of Pwn award worth US$25,000 (£21,000, A$32,000). Hacks can require users to browse to malicious content within the default browser or by viewing or receiving a malicious MMS/SMS messages. More to come. ®
Up to half a million downloads clocked for one poision app. More than 400 malicious apps from a single attacker have been successfully uploaded to the Google Play store, with one downloaded up to half a million times, Trend Micro malware researcher Echo Duan says. The malware is disguised as various games, phone boosters, and themes that when executed can compromise devices and connected networks, download additional payloads, and enslave handsets into botnets. Such malware is usually barred from the Google Play store thanks to security analysis checks Mountain View runs to determine apps that steal user data, spam with advertisements, or adversely impact privacy. The prolific authors who have created some 3000 variants of the DressCode malware have had a significant win in breaching Google's defences since apps hosted on the Play store are considered and marketed as safe. Duan says the malware attempts to gain a foothold on any networks the compromised handsets are connected to making it a threat to to enterprises and small businesses. This malware gives attackers an avenue into internal networks which compromised devices are connected to—a notable risk if the device is used to connect to company networks. "If an infected device connects to an enterprise network, the attacker can either bypass the NAT device to attack the internal server or download sensitive data using the infected device as a springboard," Duan says. "With the growth of bring your own device programs, more enterprises are exposing themselves to risk via care-free employee mobile usage. "[The installed SOCKS proxy] can be used to turn devices into bots and build a botnet." DressCode and you.
Image: Trend Micro. Duan says the malicious code was a small fraction of the total app codebase making it "difficult" for Google to detect. One app offering a Grand Theft Auto theme for Minecraft clocked between 100,000 and 500,000 downloads according to Google Play's metric bands. Compromising modern Android handsets is increasingly difficult for regular malware players thanks to big leaps in defensive upgrades, but most phone users run old, unsupported, and dangerously exposed versions of the mobile operating system. Some 35 percent of Android users operate version five (Lollipop) of Google's platform released in 2014, while about 25 percent run ancient version 4.4 (Kitkat) published in 2013. Fewer than 10 percent run Android version six (Marshmallow) released last year and virtually no one other than owners of Nexus 6P devices sports version seven (Nougat) published last month. Outside of the Nexus line, handsets everywhere are locked into custom vendor ROMs and as such must reply on manufacturers to push through Google's security updates and patches. Trend Micro says it flagged some 16.6 million malware detections as of August, 40 per cent up on January figures. ®