Ad

Like Us On Facebook

Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Monday, July 29, 2013

Tom cruise Will Spend 50000 Dollars For His Daughters Security

Hollywood hero Tom Kruise his seven-year-old daughter Suri has hired bodyguards for protection. Sources Kruise


these bodyguards are willing to pay up to $ 50 thousand. The Bodyguard Tom for week 50 thousand dollars will protect Suri.

Sources said the security of his wife and daughter had become quite important. These days, many people came to his daughter and ex-wife back. Given the increase arose about their safety. However Krus two to four bodyguards are for your own safety but his daughter's life is worth to them. Sources said that security personnel are highly trained. They also have foreign license. His wife is quite happy with this decision.

Tuesday, July 16, 2013

The security of the Android phone

If your phone runs on the Android operating system, so be careful when downloading every new app.

Research on the mobile security app for Android Verification System by Bluboks the company has devised a Khami. Such gaps or holes in the language of the computer "bug" is called.


Because of this bug, you can accidentally download an app to help you Sfact data.

Bluboks claims that because of this bug is possible to steal data from Android phones. Bluboks drawback to the "master" is named.



After 2009 came the Android operating system has a shortfall.

Cryptography verification problem is




Bluboks in February that Google had told about this bug.
Click the legitimacy and security of an Android app or program to test that uses cryptographic signature.

Android Foristol and his colleagues found a way to break the method signature checking. The app does not detect changes in the harm.



Foristol writes in his blog, "the general function takes control of the phone is asleep and then do whatever you want."

This bug was discovered in February Bluboks Google told about.

Foristol in August this year, the Black Hat hacker conference organized on this issue and are planning to give information.



And hackers to steal your information other than the bug will have a little more effort. In an interview with Ars Technica, click the name of the publication that is pointed to by security expert Dan Vailec.

Dan writes Vailec Android hackers to reach consumers, counterfeit version of a real application would put Google Plestor.

Sunny leone Gallery