Mutant Malware Threatens US Android Phones
Now the company behind the open-source Firefox browser is talking about software, showing how its Firefox OS apps can run on Google Android devices . The apps are all built with HTML5, meaning they arent like the native apps youd find on Android or on iOS or Windows Phone, for that matter. These are more akin to the third-party web apps available for the original iPhone in 2007. Firefox OS apps have more functionality than those web apps from seven years ago, however: The company has been working on various APIs that let HTML5 apps access phone hardware such the camera, gyroscope and internal storage, for example. Heres a look how this all works on Android phones: You can install Firefox OS apps from Mozillas online marketplace : Theres actually quite a bit of affinity between Mozillas smartphone platform and Googles. When Mozilla first started what is today called Firefox OS, it was actually implemented as Boot 2 Gecko on a few select Android handsets. Like Android, it runs on a Linux kernel as well.
Original version, visit http://gigaom.com/2014/06/13/expanding-its-reach-mozilla-touts-firefox-os-apps-running-on-android/
When a user with a Svpeng-infected phone tapped the Google Play app, Svpeng launched an overlay designed to look like an authentic part of the app, which asked users to "re-enter" credit-card numbers or other financial information. But that's wasn't all. Early in 2014, Svpeng decided that being a banking Trojan just wasn't adequate to express its full identity. Svpeng now incorporates ransomware features specific to "police Trojans." In those variants, Svpeng would replace the regular Android screen with a message, allegedly from local law enforcement, claiming that the phone's owner had been caught viewing child pornography and would need to pay a fine of $500 in order to unlock the phone. Soon after that, reports Kaspersky, Svpeng's creators decided to spin off its ransomware component into an entirely separate piece of malware. This new version of Svpeng got a makeover in looks as well as strength: Its screen overlay stops Android users from accessing any other device functions, and is difficult to circumvent because the malware launches upon reboot. (Affected users should use Google to learn how to put their specific device into "safe mode," which may get around the lockout.) The creators have also customized the new variant of Svpeng to target Android users in the United States, tricking out the lock screen with an FBI logo. This version takes a picture of the infected phone's user with the device's front-facing camera and displays it on the screen, claiming the FBI have the image and know the user's face.
Original version, visit http://www.tomsguide.com/us/svpeng-android-ransomware,news-18977.html