Google releases its Android file storage manager to all

Google has filled a big hole in its Android system by releasing Files Go! , its mobile file organization and sharing app. Launched in beta last month , the app makes it easier for Android users to free up space, find files, back them up to the cloud, and share them with other smartphones, even offline. It’s one of the linchpin apps of Google’s Oreo 8.1 (Go edition) , a slimmed down version of Android meant for the less-powerful devices in developing nations. Files Go! will also be handy for power users who currently lean on third-party file organization apps, which are often paid or ad-supported . On top of giving you direct access to your downloads, received files, apps, images, video, audio and documents, it will offer suggestions for freeing up space. For instance, it can tell you how much you can free from your app cache, unused apps, large files and downloaded files. It’ll also offer to move files to an SD card, if you have one. Another long overdue feature is the ability to share files offline, Airdrop-style. When you enable the feature, it lets you create a “hotspot” to connect and transfer files via Bluetooth. If a friend also has Files Go and file sharing enabled, it’s simply a matter of hitting send or receive. “The file transfers are encrypted, fast (up to 125 Mbps) and free, ” says Google. The app can also remind you when you’re low on storage and let you backup files to Drive, OneDrive, Dropbox and other apps. Google says it has been testing the app for a month and has saved users an average of 1GB space. It’s now available for all on the Google Play Store , assuming you have Android 5.0 or higher. ” Source: Google

Read More:
Google releases its Android file storage manager to all

Code-execution flaws threaten users of routers, Linux, and other OSes

Enlarge (credit: Christiaan Colen ) Google researchers have discovered at least three software bugs in a widely used software package that may allow hackers to execute malicious code on vulnerable devices running Linux, FreeBSD, OpenBSD, NetBSD, and macOS, as well as proprietary firmware. Dnsmasq , as the package is known, provides code that makes it easier for networked devices to communicate using the domain name system and the Dynamic Host Configuration Protocol . It’s included in Android, Ubuntu, and most other Linux distributions, and it can also run on a variety of other operating systems and in router firmware. A blog post published Monday by security researchers with Google said they recently found seven vulnerabilities in Dnsmasq, three of which were flaws that allowed the remote execution of malicious code. One of the code-execution flaws, indexed as CVE-2017-14493, is a “trivial-to-exploit, DHCP-based, stack-based buffer overflow vulnerability.” Combined with a separate information leak bug Google researchers also discovered, attackers can bypass a key protection known as address space layout randomization, which is designed to prevent malicious payloads included in exploits from executing. As a result, exploits result in a simple crash, rather than a security-compromising hack. By chaining the code-execution and information leak exploits together, attackers can circumvent the defense to run any code of their choosing. Read 2 remaining paragraphs | Comments

See more here:
Code-execution flaws threaten users of routers, Linux, and other OSes

Spyware backdoor prompts Google to pull 500 apps with >100m downloads

Enlarge (credit: portal gda ) At least 500 apps collectively downloaded more than 100 million times from Google’s official Play Market contained a secret backdoor that allowed developers to install a range of spyware at any time, researchers said Monday. The apps contained a software development kit called Igexin, which makes it easier for apps to connect to ad networks and deliver ads that are targeted to the specific interests of end users. Once an app using a malicious version of Igexin was installed on a phone, the developer kit could update the app to include spyware at any time, with no warning. The most serious spyware installed on phones were packages that stole call histories, including the time a call was made, the number that placed the call, and whether the call went through. Other stolen data included GPS locations, lists of nearby Wi-Fi networks, and lists of installed apps. In a blog post published Monday , researchers from mobile security company Lookout wrote: Read 3 remaining paragraphs | Comments

Visit site:
Spyware backdoor prompts Google to pull 500 apps with >100m downloads