Monday, August 11, 2014
SHORTENED BLOG URL
----------------------------------------ATTENTION VISITORS!!!!!------------------------------------
AS THE OWNER AND CREATOR OF Keep Jacksonville Awesome!!!!!! , I HAVE SHORTENED THE URL OR ADDRESS TO THIS BLOG. THIS CHANGE WILL NOT AFFECT THE LOOK OF THE BLOG. ALL THIS DOES IS THAT INSTEAD OF TYPING THE WHOLE URL, YOU CAN JUST TYPE IN A SHORTER VERSION THAT STILL TAKES YOU TO THIS BLOG! THE SITES YOU CAN USE TO VISIT THIS BLOG ARE LISTED BELOW:
1. keepjaxawesome1.blogspot.com (ORIGINAL)
2. http://adf.ly/r39Cx (NEW)
3. http://goo.gl/FY6K8y
YOU WILL NEED TO SKIP AN AD IN THE NEW adf.ly URL LABELED ABOVE. IT WILL STILL TAKE YOU TO A NON-MALICIOUS VERSION OF THIS SITE.
THANKS FOR YOUR COOPERATION IN THIS BLOG CHANGE/UPADTE!!!!
Sincerely,
Sanel Kukic
Blog Admin/Creator
Monday, July 28, 2014
-------------------------------------ATTENTION MUSLIMS!!!!!!---------------------------------------
We all know today was a holiday called BAJRAM and, well, I only got $114.01. My brother got $137.00. We all know that my brother got more than me! Me, my brother, and my dad were security officers along with some friends from 5 am to 10:06 am! I almost went to sleep! It has literally paid off being security officers! Literally! I would appreciate it very much if you commented on this blog post and tell me the following:
-Name (First, Last and Middle if applicable)
-Amount you earned at the mosque only.
-Amount you earned around your neighborhood (if applicable)
-TOTAL Amount earned
I would very much appreciate that you comment on this post with the above listed information if you are a muslim. Also, if your amount is more than mine please comment initials SK and if your amount is more than my brother's comment AK. This way, I know if you have more or less than me and if you have more or less than my brother. Thanks and BAJRAM SERIF MUBAREK OLSUN!
Sincerely,
Sanel Kukic
Blog Creator
Saturday, July 26, 2014
-----------------------------------IMPORTANT BLOG UPDATE----------------------------------------
--------------------------------------FRAUD/SCAM ALERT!--------------------------------------------
I HAVE JUST RECIEVED BREAKING NEWS THAT ANDROID FEATURES ARE BEING USED MALICIOUSLY!!!!! I DO HAVE MORE INFO AS SHOWN BELOW:
We hear a lot about the high amount of Android malware running rampant. An interesting tidbit is a vast majority of malware doesn’t need any special ‘magic’ to behave maliciously. They use existing functionality to attack users, functionality available to all developers.
We’ll take a look at a couple of these methods in which malware is able utilize, once their permission request is granted and the app is installed.
SMS Receivers
This first method is monitoring incoming SMS. Malware can use SMS to send premium messages, sign you up for paid services, send spam, and a lot more.
Let’s look at the RECEIVE_SMS permission, used heavily by bank Trojans to capture authentication codes and other information related to an account. With this permission granted the malware will create a ‘Receiver’ to monitor incoming SMS.
Once an SMS message is captured, it can do a variety of things like abort the message notification, delete, and collect the contents of the message.
The example here shows how a Korean bank Trojan collects an incoming SMS message, sends to a remote server, and then aborts the notification. The data sent includes the compromised device’s phone number, incoming number, and message contents.
http://blog.malwarebytes.org/wp-content/uploads/2014/07/sms03b.jpg?w=564
Many apps request to send or receive SMS so the permission request can often be overlooked when installing. The challenge is we can’t see what goes on behind the scenes so SMS could be sent, received, deleted, and contents sniffed without our knowledge. We just have to hope Google is keeping us secure.
Device Administrator
Another feature exploited is the security setting “Device Administrators.” Introduced in Android 2.2 it was put in place to help IT department’s better secure corporate Android devices. When an app is defined here, system administrators can enforce policies for devices such as password strength, locking device, and remote wipe.
When an app is listed as an administrator it needs additional steps to uninstall, the app must first be deactivated from Device Administrators.
Malware authors typically use this functionality to prevent an app from being uninstalled.
In this example, Device Administrator is used to prevent uninstalling as usual, but by monitoring events such as the Action DEVICE_ADMIN_DISABLE_REQUESTED, this ransomware is able to block the deactivation attempt. Even in Safe Mode, where only system apps should be started it is able to block deactivation, making this guy even more difficult to remove.
http://blog.malwarebytes.org/wp-content/uploads/2014/07/device_admin02.jpg?w=564
Ransomware, like Koler, SimpLocker, and FBILocker, are becoming more of a nuisance incorporating methods like this, making them even more difficult to remove. Early variants would not block a users access to the device, so if you didn’t fall for the scam you could easily uninstall.
You can review which apps you have installed that are Device Administrators through your Android settings. Settings -> Security -> Device Administrators.
These are just a couple of examples of how malware uses existing Android’s features in malicious ways. We suggest you review permissions before installing apps and backing up your data.
Give a second thought to apps requesting to be Device Administrators.
Wlcome 2 my NEW BLOG!!!
HELLO EVERYONE AND WELCOME TO MY AWESOME NEW BLOG! I WILL BE SHARING DARK, DARK CELEBRITY SECRETS WITH EVERYONE ALONG WITH SECRETS ABOUT MY EVERYDAY LIFE! I MIGHT ONLY POST ABOUT ONCE A MONTH. HAVE FUN!!!!!
Subscribe to:
Posts (Atom)