Tuesday, June 02, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
BlackBerry 10.3.2 and BlackBerry Blend 1.2 Coming to All BlackBerry 10 Devices
Instagram To Open Up Its Advertising Platform
G.SKILL at Computex 2015
LG Display Showcases 18-inch Rollable Display At SID
MSI Highlights First Gaming Notebooks With Eye-tracking Capabilities at COMPUTEX 2015
Vimeo Launches Subscription Service
E FUN Introduces Affordable Flexx 2-in-1 Windows Tablets
Atmel Showcases System Solution for Wearables at Computex 2015
Active Discussions
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, January 22, 2014
Researchers Find VPN Vulnerability On Android Phones


Security researchers have claimed a flaw affecting Android 4.3 can be used to hijack unencrypted communications from an active VPN connection.

According to researchers at Ben Gurion University's (BGU) Cyber Security Labs, a network vulnerability on Android devices enables malicious apps to bypass active VPN configuration (no ROOT permissions required) and redirect secure data communications to a different network address. These communications are captured in CLEAR TEXT (no encryption), leaving the information completely exposed. This redirection can take place while leaving the user completely oblivious, believing the data is encrypted and secure.

The researchers also demonstrated the vulnerability in a video, using the popular Samsung S4 device running on Android 4.3. KitKat. A user opens an email client and sends an email, with VPN enabed. But a packet capturing tool installed on a computer connected to the same network as the mobile device was showing traffic flowing through it (the SMTP packets), although no communications was supposed to pass through. The data of the communications protocol was analyzed and then the researchers could read the whole mail content.

The researchers added that SSL/TLS traffic can be also captured with this exploit but the content stays encrypted and not in clear text. They also confirmed the vulnerability on multiple Android devices from different vendors.

The new find follows a bug that BGU previously claimed to have found in Samsung's secure app container Knox, which, also relied on a malicious app to bypass the security feature to intercept outgoing communications data. Samsung and Google denied it was a flaw in Android or Knox, but admitted the researchers' attack used legitimate Android functions in an unintended way.

According to BGU, the new vulnerability is similar to the previous vulnerability they had disclosed to Samsung, by the fact that both of them work in a similar manner while the difference among them is the exploit target.

The researchers said they had filed a report with Google, which is yet to respond to the claimed vulnerability.




Previous
Next
VMware to Acquire AirWatch For $1.54 Billion        All News        Toshiba Develops 522Mbps TransferJet Module for Smartphones
Jury Finds Google Infringed SimpleAir Patent     Mobiles News      Toshiba Develops 522Mbps TransferJet Module for Smartphones

Get RSS feed Easy Print E-Mail this Message

Related News
Nvidia Brings GameWorks To Mobile With AndroidWorks
Factory Resetting Your Android Phone Does Not Delete Everything
Should We Expect Android OS For IoT Next Week?
Office for Android Phone Preview Released
Android One Now Available In Europe
Some Android Smartphone Apps May Track You
Android Wear Updated
New Android Installer Vulnerability Exposes Android Device Users to Data Theft
Android Watch To Keep a Watch on Your Phone
Android 5.1 Lollipop Update Officially Released
Google To Bring Android Into VR
Google Says Android Lollipop Does Not Encrypt Data Due To Performance Issues

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .