Need to cancel wed night thing tonight unless ldo wants to run it.. Family crisis

--
sent from my Galaxy S3

On 22/10/2014 9:09 AM, "Peter Reutemann" <fracpete@waikato.ac.nz> wrote:
"Researchers have found a way to deliver a malicious app to Android
users by hiding it into what seems to be an encrypted image file,
which is then delivered via a legitimate, seemingly innocuous wrapper
app. Fortinet malware researcher Axelle Apvrille and reverse engineer
Ange Albertini created a custom tool they dubbed AngeCryption, which
allows them to encrypt the payload Android application package (APK)
and make it look like an image (PNG, JPG) file . They also had to
create another APK that carries the "booby-trapped" image file and
which can decrypt it to unveil the malicious APK file and install it.
A malicious app thusly encrypted is nearly invisible to reverse
engineers, and possibly even to AV solutions and Google's Android
Bouncer."

-- source: http://mobile.slashdot.org/story/14/10/21/1325236

Cheers, Peter
--
Peter Reutemann, Dept. of Computer Science, University of Waikato, NZ
http://www.cms.waikato.ac.nz/~fracpete/�� �� �� �� �� Ph. +64 (7) 858-5174
_______________________________________________
wlug mailing list | wlug@list.waikato.ac.nz
Unsubscribe: http://list.waikato.ac.nz/mailman/listinfo/wlug