2011年4月16日星期六

Skype for Android vulnerable to hack that compromises personal info

在 ServiceModel 客户端配置部分中,找不到引用协定“TranslatorService.LanguageService”的默认终结点元素。这可能是因为未找到应用程序的配置文件,或者是因为客户端元素中找不到与此协定匹配的终结点元素。
在 ServiceModel 客户端配置部分中,找不到引用协定“TranslatorService.LanguageService”的默认终结点元素。这可能是因为未找到应用程序的配置文件,或者是因为客户端元素中找不到与此协定匹配的终结点元素。
By Sean Hollister posted Apr 14th 2011 10:02PM If you didn't already have enough potential app privacy leaks to worry about, here's one more -- Android Police discovered that that Skype's Android client leaves your personal data wide open to assault. The publication reports that the app has SQLite3 databases where all your info and chat logs are stored, and that Skype forgot to encrypt the files or enforce permissions, which seems to be a decision akin to leaving keys hanging out of the door.

Basically, that means a rogue app could grab all your data and phone home -- an app much like Skypwned. That's a test program Android Police built to prove the vulnerability exists, and boy, oh boy does it work -- despite only asking for basic Android storage and phone permissions, it instantly displayed our full name, phone number, email addresses and a list of all our contacts without requiring so much as a username to figure it out. Android Police says Skype is investigating the issue now, but if you want to give the VoIP company an extra little push we're sure it couldn't hurt.

web coverage

View the original article here

没有评论:

发表评论