Error
  • JUser::_load: Unable to load user with id: 67

Featured Articles

HP Stream is a Chromebook killer priced at $200

HP Stream is a Chromebook killer priced at $200

We have been hearing reports of a new breed of affordable Windows notebooks for months. It is alleged that a number…

More...
AMD Radeon R7 SSD line-up goes official

AMD Radeon R7 SSD line-up goes official

AMD has officially launched its first ever SSDs and all three are part of AMD’s AMD Radeon R7 SSD series.

More...
KitKat has more than a fifth of Android users

KitKat has more than a fifth of Android users

Android 4.4 is now running on more than a fifth of Android devices, according to Google’s latest figures.

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Thursday, 01 December 2011 12:27

Snoopy rootkit in Android, RIM and Symbian exposed

Written by



Herman Cain tweets sigh of relief from his iPhone


Conspiracy theorists look out. Security researcher Trevor Eckhart has exposed a potentially very serious rootkit hidden deep in the operating systems of many Android, Blackberry and Nokia phones.

Millions of phones apparently feature a sneaky piece of software dubbed Carrier IQ and Eckhart claims the software is nearly impossible to spot and it cannot be disabled or removed. What’s more, he claims the software not only records the device’s location, but also records every keystroke on some handsets.

Understandably, the makers of Carrier IQ dismiss the findings and claim their benevolent piece of code is merely there to provide telecoms with information needed to diagnose reception problems and improve their service. Exactly how this is achieved through logging keystrokes in anyone’s guess.

The company filed a cease-and-desist order against Eckhart, but failed to silence him. Law professor Paul Ohm thinks there is a good chance the software is violating federal wiretapping laws in the US.

“If CarrierIQ has gotten the handset manufactures to install secret software that records keystrokes intended for text messaging and the Internet and are sending some of that information back somewhere, this is very likely a federal wiretap,” he said.

So, in the unlikely case that CarrierIQ really did store or send recorded keystrokes anywhere, phone makers could be looking at the mother of all class-action suits.

Last modified on Thursday, 01 December 2011 12:30
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments