Almost two-weeks after Bluebox Security announced a vulnerability in Android's security model that could enable attackers to convert most Android applications into Trojans, and more than a week after Google released the fix for it, the vast majority of Android OEMs has yet to patch the hole.
Android 4.3 added significant new security features, and Google has also added two other new security features to older versions of Android. Now, if only the carriers and OEMs would patch the Bluebox security hole every Android user would be happier.
Google has patched a master key vulnerability in Android that was recently identified by Bluebox Security, according to an industry report. The vulnerability, which allowed hackers to modify APK code without breaking an apps cryptographic signature, could convert 99 percent of all Android apps into malicious Trojans, claimed Bluebox.
By now, you've heard about the giant Heartbleed security hole in OpenSSL, the extremely popular Secure Socket Layer/Transport Layer Security (SSL/TLS) library that's used by almost all BSD, Linux, and Unix servers. What you may not know is that, like a ticking time bomb, that same bug may be within your cloud.
Bluebox Security launched its first mobile data security solution, which it said will protect corporate data across any mobile application on iOS or Android, allowing enterprises the peace of mind to let employees use their mobile devices wherever and however they want.
VLC Media Player 2.0.8 has been released. This is a maintenance release that fixes some regressions in the 2.0.x branch. There are also numerous fixes for crashes, dangerous behaviors, ISDB-S tuning and some OS X issues were resolved.
Summary: The data released by Google shows that Jelly Bean power 48.6 percent of all Android devices. But fragmentation remains a big problem, and getting users onto the latest version continues to be an uphill struggle.