Skip to main content

Spy-alert! Your Android phone may be listening to you, & secretly taking screenshots of activities


Spy-alert! Your Android phone may be listening to you, & secretly taking screenshots of activities


phone-privacy-tech-ThinkstockPhotos-658191736
Some popular apps on your Android phone may be actively listening to you, monitoring your habits and even secretly taking screenshots of your activity and sending them to third parties, a new study has found. 


These screenshots and videos of your activity on the screen could include usernames, passwords, credit card numbers, and other important personal information, the researchers said. 



"We found that every app has the ability to record your screen and anything you type," said David Choffnes, a Professor at Boston's Northeastern University.The findings will be presented at the Privacy Enhancing Technology Symposium Conference in Barcelona. 



For the study, the team analysed more than 17,000 of the most popular apps on the Android operating system, using an automated test programme written by the students. 


In all 9,000 of the 17,000 apps showed the potential to take screenshots.
"There were no audio leaks at all. Not a single app activated the microphone," said Christo 
Wilson, Professor at the varsity. 

"Then we started seeing things we didn't expect. Apps were automatically taking 
screenshots of themselves and sending them to third parties." 

Although these privacy breaches appeared to be benign, they emphasized how easily a 
phone's privacy window could be exploited for profit. 

"This opening will almost certainly be used for malicious purposes. It's simple to install and 
collect this information. And what's most disturbing is that this occurs with no notification to
 or permission by users," Wilson noted. 

Although the study was conducted on Android phones, there is no reason to believe that 
other phone operating systems would be less vulnerable, the researchers said. 




Comments

Popular posts from this blog

Momo suicide game

Microsoft clamps down on sick 'Momo suicide game' in 'Minecraft' Microsoft is clamping down on the sick “Momo suicide challenge,” which recently infiltrated the wildly popular online game “Minecraft.”The tech giant owns “Minecraft” developer Mojang. The vile “Momo suicide game” has been garnering attention after spreading on WhatsApp, prompting police warnings. "Momo" is a viral challenge that asks people to add a contact via WhatsApp - they are then   urged   to commit self-harm or suicide. The "game" has fueled comparisons to the sinister " Blue Whale challenge " that led to reports of suicides in Russia and the U.S, as well as the online fictional character of "Slender Man." In 2014 two 12-year-old girls in Wisconsin  attempted to kill   a classmate in an attempt to please the horror character. The Buenos Aires Times recently  reported  that police in Argentina are investigating whether “Momo” is linked to the suicide of a 12-y...

Java Functional Interfaces

  The term   Java functional interface   was introduced in Java 8. A   functional interface   in Java is an interface that contains only a single abstract (unimplemented) method. A functional interface can contain default and static methods which do have an implementation, in addition to the single unimplemented method. Here is a Java functional interface example: public interface MyFunctionalInterface { public void execute(); } The above counts as a functional interface in Java because it only contains a single method, and that method has no implementation. Normally a Java interface does not contain implementations of the methods it declares, but it can contain implementations in default methods, or in static methods. Below is another example of a Java functional interface, with implementations of some of the methods: public interface MyFunctionalInterface2{ public void execute(); public default void print(String text) { System.out.println(t...

Kali Linux 2017.2

Most Advanced Penetration Testing Distribution, Ever. New and Updated Packages in Kali 2017.2 In addition to all of the standard security and package updates that come to us via Debian Testing, we have also added more than a dozen new tools to the repositories, a few of which are listed below. There are some really nice additions so we encourage you to ‘apt install’ the ones that pique your interest and check them out. hurl  – a useful little hexadecimal and URL encoder/decoder phishery  – phishery lets you inject SSL-enabled basic auth phishing URLs into a .docx Word document ssh-audit  – an SSH server auditor that checks for encryption types, banners, compression, and more apt2  – an Automated Penetration Testing Toolkit that runs its own scans or imports results from various scanners, and takes action on them bloodhound  – uses graph theory to reveal the hidden or unintended relationships within Active Directory crackmapexec  – a post-expl...