Android Security, Zero Day Vulnerability, and Bitcoin Key Protection
Safety of the Bitcoin protocol is one of its defining features, and one of the main selling points. Crypto-connoisseurs praise and sprinkle holy water on the protocol when pitching the technology. It is true, though. The protocol is practically inviolable. It cannot easily be hacked. It cannot easily be tampered with. It is insulated by its distributed....
Related News
Multiple versions of Android are vulnerable to Dirty Cow, regardless of device manufacturer. Even though mobile devices are becoming more popular than ever before, there are still systemic risks. Mainly the Android operating system seems vulnerable to more attacks than ever before. Dirty Cow, a new vulnerability discovered this week, may affect a lot of Bitcoin users as well. One can never be too careful when dealing with finances. It is not the first time a new Android vulnerability is discovered. Given the sheer popularity of this mobile operating system, hackers have been attracted to....
A critical security vulnerability has been found in Android which renders bitcoins stored in Android Bitcoin wallets vulnerable to theft, and the exploit is currently being used in the wild to steal people's bitcoins. Several people have reported that their Android wallets were cleared out and the funds sent to 1HKywxiL4JziqXrzLKhmB6a74ma6kxbSDj, an address which currently contains 55.8 BTC. Because the bug is a flaw in Android itself, all Android Bitcoin wallets are vulnerable. Bitcoin Wallet for Android, Bitcoin Spinner, the mobile version of blockchain.info and Mycelium Wallet are all....
Android users all over the world have been the target of many dangerous types of software over the past years, and there is no end in sight just yet. One of the latest exploits plaguing the Android ecosystem is a new version of the Stagefright bug. Unfortunately for Android users, this latest iteration of Stagefright exploits a vulnerability in MP3 and MP4 files, both are oftenly used media types on mobile devices these days. Once an Android device is infected with the Stagefright 2.0 bug, attackers can use this vulnerability execute code. Various use cases can be found for executing....
During security testing a vulnerability was exposed on the Authy app, a two-factor authentication tool. Less than 0.2% of Authy users were affected. An outside security research team discovered the vulnerability which affects users who changed the phone number on Authy accounts since February 2014. The users affected were no longer able to access their original phone and so thus had to prove phone ownership. This process included government issued ID’s. Authy immediately moved to patch the vulnerability and has no evidence the vulnerability was exploited by nefarious characters. Authy sent....
A Canadian programmer has published what he claims is a vulnerability in Coinbase's Android apps, one that could allow an attacker to gain full access to a user's account. Software Engineer Bryan Stern went so far as to caution users not to use the Coinbase Bitcoin Wallet and Merchant apps for Android until the problem is fixed, and advised them to check their accounts for suspicious activity. However, the company has since responded to Stern in a reddit thread stating that the vulnerabilities were not as serious as Stern claims. Stern, who works on Android development at Hootsuite, said....