Android Security.

Good App vs Bad App

Mobile phone has become a part of our life rather a part of our body! weather its Facebook, Twitter, IM , or banking  are done by mobile now a days. And day by day mobile are becoming sophisticated as your computers and thus becoming a new window for hackers to make your digital life turn to hell. But there are some security mesures that can be taken to keep your digital life secured. The most popular mobile next to iPhone is Android, we will see what are the recent security issues related to Android and what can be done to protect yourself from such threats.

Android OS has its own security permissions for each of the applications installed in the handset. While you are installing the application from the older version of Android store you are shown with a screen where you select the security preferences of the application, like if you want that application to access your data,or send sms or connect to internet. But recently Android has made a new web based app market where you install apps OTA. In this type of installation we dont see the security preferences options while we are installing the app, most of the users don”t know that there exists such a option, making it more vulnerable to security issues. Recently antivirus giant McAfee has said that there is a rise of mobile virus and mallwares by 46% as most of the people today goes online from mobile rather then from a PC. They also said that the two most attacked mobile OS are Nokia Symbian and Google Android. Generally the iOS platform is considered secured for consumers as the Apple App Store is a closed one (considering you are average user who have not jailbreak your device) and RIM BlackBerry OS is also considered to be safe as its target audience is corporate and business men.

So the very obvious question that comes to your mind is what should general users do to help protect their Android devices?

Follow these simple rules to prevent your Android from getting hacked.

  1. Don”t “Root” your device unless you know what you are doing.
  2. Never get attracted to apps which says “free wallpapers”, “free screensavers”, “free ringtones” most virus and mallware use this kind of apps to disguise them from unsuspecting users. Think for a whle why u need to download an “app” to get u wallpapers? u can use a image to set as your wallpaper. there are millions of sites offering you wallpapers (usual format if jpg) and ringtones (usual format is mp3) to help you personalize your phone. I am not saying all the apps which offers free wallpapers and ringtones are bad, but i am saying that when it gets difficult to choose the right from wrong then go for a safer alternative.
  3. How to know from a good app from a bad app? There are many fake apps in the Android Market. You need to be very careful while you select which app to install. Some of the popular iPhone apps which generally don”t have Android version can also be found on Android Market obviously they are fake. Recently “Cut the rope” a popular iPhone game had not one but many fake apps Christie also seeks a lift in financial support “for other advantageous reasons that best casino gaming was initially approved. on Android Market. To find out a good app from a bad app is not that really hard. Say you want to download one app, a particular app which you have seen in someones else phone or read about or heard about it somewhere. You search for it in App Market and found more than one result! So what do you do? unless you know the name of the original company which you can find out by searching for it in Google. You should read the reviews generally apps which get most reviews and starts is the good app.
  4. Setting the security preferences and understanding them.While setting the security preferences you should know and understand what does it really means and does before clicking all “Accept” and “Yes” and “Next” which you see on the screen [like you do while installing software on Windows PC 🙂 ] Some of the basic security preferences are granting access to your data, you should think before granting this access. what will a game do by access your data? well a media player may access your data the media which it will play is stored on your phone so it may require to access it. But a game will never need to access your data. Again nor any media player or game needs to be given permission to send sms or text, it may happen that one application  may send some premium text which adds to your phone bill and drain your money from your pocket. And you should be really careful while granting access to use internet,GPRS,EDGE,3G or whatever data communication method available in your phone model. As it has been recently seen that an app can transmit all your personal information to someone who is sitting across the globe without your knowledge.

PlayStation 3 Cracked again.

One of the world’s most loved console Sony’s PS3 has been hacked by the famous Wii hacker Youness Alaoui. Sony recently released a firmware update 3.5.6 which was hacked in one day of the release. The patch was pushed to stop the modded or hacked PS3 to stop joining PSN network. .As the latest update has been unpacked and signing keys have been published so that other modders can create a custom firmware which can mimic the PSN network making it thing that the user is having the latest firmware and thus allow access to PSN network.

The most interesting part is that this news spread on the same day when Sony won a case over illegal modding of PS3 by George ‘Geohot’ Hotz he has been given restraining order to take part in any PS3 hacking activities.

Source: Twitter post of Youness Alaoui.

Happy 27th Birthday Apple Mac.

January 24th, 1984 was the day when the world’s most loved computer Mac was reveled by its father Mr Steve Jobs. The first Mac or Macintosh the first ever personal computer to run Apple’s OS was reveled to a crowd of 3000 people! (I wonder how much people r there in current Apple launch day program when Steve address) The operating system which it used to run was not Mac OS X it was called System 1.0. The hardware consisted of 9″ greyscale monitor, 8Mhz Processor, 128KB DRAM, 16bit Bus.

Did any one back then imagined that Mac will be the choice of computer for all the people
who are into graphics design, move editing, animation ?Well at that point of time it was
really a breakthrough in computing world.
All I want to say is Happy Birthday Baby You have come long way.

Here is the video of the event, view it and i am sure u will find striking resemblance with the very recent videos of Steve Jobs when you saw him reveling the iPhone or iPad.


iTunes decompiled to found proof of Qualcomm baseband use in Apple devices.

Italian hacker Zibri decomiled the latest version of iTunes by Apple to found the proof of use of Qualacomm baseband.According to Zibri files “partition.mbn” and “AMSS.MBN,” means Qualacomm baseband.As far as I know till now nothing else have best online casino been said about it, may be some more info will star casino . be found by him. But i must said decompiling Apple software and sharing the information to the world is a great dead.

Here is a part of the code released by him.

Code released by Zibri

For more info visit Zibri”s blog


The Android Story

Recently there has been much trouble for the Android as Oracle sued Google for copyright infringement, as it was found that as much as 43 source files were copied from J2SE to code the Android platform. But Google responded it with many valid points. It is not justified for Oracle to sue Google as because of

  • Sun open-sourced J2SE under the GPL license in the year 2006 and 2007 and it did not had any patent or copyright along with its code.
  • For Android Google had used a subset of Apache Harmony Java implementation.
  • For demonstrating compatibility with the Java specification the only way is to use Sun’s Technology Compatibility Kit, or TCK, and there has been internal strife about the license for the Java TCK, or JCK, for a long time among Sun / Oracle and Apache.
  • The one and only license offered by Sun t Apache is “field of use” which restricts the use in mobile platform only.

Is it that because Android has become so much popular and grown in business the real reason for Oracle to sue it? I did not find any valid reason on which ground did Oracle took such a step.

Read the Full response by Google to the lawsuit, the original document is attached, and decide for yourself. Do comment tour thoughts.

Google answer to Oracle’s lawsuit


Hi, I am Ahit, a boy who loves technology more then himself. A coder, developer, designer. And now a blogger 🙂 I will be using this blog primarily for giving info, news and reviews about the latest technologies and gadgets. Hope you guys like it.