OnePlus 2 will soon receive official CyanogenMod ROM support

OnePlus-2-device-624x351.png



The official CyanogenMod support for OnePlus 2 has been reportedly listed via GitHub, and spotted by Reddit users. The report lists both CyanogenMod 12.1 and CyanogenMod 13 builds for the OnePlus 2.

However, users cannot download these builds as of now but is expected to be available soon. Users will have the option to flash between two versions which is either Android 5.1.1 Lollipop or Android 6.0 Marshmallow. One will have to root their phone and the latest custom recovery, but will have to be careful as this might compromise the device’s warranty.

With the OnePlus 2, the company has built a device that competes with the likes of the Google Nexus 6P and others. In fact, the superior specs sheet at a comparatively lower price gives it an edge over the other flagships.

Design-wise, the metal-frame design makes it look premium. It sports a 5.5-inch 1080p display. As promised, the smartphone also comes with a fingerprint scanner and USB Type-C port. The fingerprint scanner is faster than the iPhone TouchID and lets you save up to five fingerprints, says OnePlus.

On the camera front, it comes with a 13-megapixel snapper. It also gets a new camera and a new solution that allows you to take 50MP photos and there’s also the slow motion mode. It comes powered by Snapdragon 810 coupled with 4GB of RAM and houses a 3,300mAh battery.





South Korea gives initial approval for first online-only banks

internet_privacy_reuters-624x351



South Korea’s financial regulator has given preliminary approval to two consortia backed by Kakao Corp and an affiliate of China’s Alibaba Group Holding Ltd to set up the country’s first online-only banks.

Kakao, which runs South Korea’s most popular mobile chat service, is part of a consortium of 11 partners including units of Tencent Holdings Ltd and eBay Inc that won approval late on Sunday from the Financial Services Commission.

Another consortium of 21 partners, led by telecom company KT Corp with Alibaba’s Alipay Holding Ltd, also received approval to open an online bank.

Shares in KT were up 2.2 percent as of 0340 GMT (10.40 p.m. ET), while Kakao gained as much as 11 percent before paring gains on Monday.

The Kakao-backed consortium, in which Korea Investment & Securities, Kookmin Bank and Loen Entertainment are also partners, plans to invest an initial 300 billion won ($259.72 million) into the bank, with 400 billion won more to be invested in 2018, the regulator said.

The consortium plans to start operations as early as next year after final approvals expected in early 2016.

KT’s consortium, whose partners also include Woori Bank and Hyundai Securities, plan to invest an initial 250 billion won in the bank, the regulator said.

In a bid to spur growth in its banking sector, South Korea is allowing non financial firms to open banks but it still bars large industrial conglomerates such as Samsung Group and Hyundai Motor Group from taking part.

Reuters








HTC looks to capture 8 percent market share in affordable smartphone segment in India

HTC-828-Dual-SIM-624x351



Mobile phone maker HTC is ramping up its presence in the affordable category (Rs 8,000-15,000) in the country with the introduction of new devices, including 4G-enabled, to gain share in the heavily contested smartphone market in India. The company, which faces stiff competition from Indian and Chinese handset makers like Micromax, Lava and Xiaomi, is confident of garnering 7.5-8 percent share of the affordable smartphone category in next six months.

“We will broaden our price play horizons at both ends. India is an important market for us. If HTC has to do good globally, India numbers have to be positive,” HTC President (Global Sales) Chia-Lin Chang said.

He added that going ahead, all new products will be 4G-compatible. Speaking at the launch of its mid-range One A9 and budget Desire 828 smartphones, Chang said the company will look at launching devices priced below Rs 10,000.

“We are looking to start from about Rs 8,000. We are hoping to gain 7.5-8 percent share in this category (Rs 8,000-Rs 15,000) in the next six months,” he said.

Currently, HTC has less than 5 percent share in the mid-range smartphone segment as it does not have devices in the sub-Rs 10,000 category. It claims to have about four percent share in the overall smartphone category.

“In India, 65 percent of smartphones sold are below the Rs 10,000 price point. Till now, we didn’t participate in that market… If we can capture 2 percent of the budget phones sold in India, we will have a huge growth momentum in India taking our global revenues higher,” Chang said.

India is one of the world’s fastest growing smartphone market. According to research firm IDC, smartphone shipments in India jumped 21.4 percent in the July-September 2015 quarter to 28.3 million units, buoyed by a three-fold jump in demand for 4G-enabled devices. Talking about the devices launches, Chang said the prices will be announced closer to the availability, which is expected to be in the next two weeks.

The HTC Desire 828 will feature 5.5-inch display, 1.5GHz octa-core processor, 2GB RAM, 16GB memory, 2,800 mAh battery and 13 MP camera.The A9 features 5-inch display, 3GB RAM, 32GB memory, 2,150 mAh battery and 13 MP camera.

PTI



DJI Osmo launched in India; 4K, fully stabilised handheld camera for Rs 69,999

Michael-Perry-DJI-Osmo-624x351



Drone specialists, DJI have launched their newest product the DJI Osmo for the Indian market. The 3-axis, fully stabilised handheld camera offers professional grade photo and video and will be available in ten major cities for a price tag of Rs 69,999.

While DJI specialises in making drones (Phantom series) and related camera equipment (Zenmuse series), the company wanted to build a tool that offered fully stabilized video for both consumers and professionals.

The DJI Osmo lets you do just that by offering a 3 axis stabilisation system that offers stable video and photo by cancelling your movements. Earlier DJI had introduced a bigger offering called the Ronin that offered the same functionality, but was clearly built for professionals allowing users to mount anything from heavy DSLRs to RED cameras.
DJI-Osmo-front

The DJI Osmo weighs in at 221 grams and packs in a 980 mAh battery which according to DJI offers 60 minutes of video recording. The device uses a smartphone (Android or iOS) as a viewfinder but communicates with the DJI Go app via Wi-Fi. Also included is a micro SD card slot with support for cards of up to 64 GB in capacity. Enthusiasts and professionals can also utilise the 3.5 mm jack and DJI will even let you plug in a professional microphone if needed.

Coming to the DJI Osmo, the unit consists of two parts, you have the handle and the Zenmuse cameras that fit on top and come in three options depending on your requirements. You have the Zenmuse X3 for consumers and prosumers, the Zenmuse X5 Pro and the Zenmuse X5 Raw that are for enthusiasts and professionals and sport a 4/3,  16 MP sensor.

DJI-Osmo-back

The standard DJI Osmo offers a 4K, 12-megapixel camera with a 1/2.3-inch sensor and a 94-degree field-of-view lens. Intelligent controls are built into the handle and allow you to control everything from panning to keeping the camera locked on to a scene. The Osmo, according to DJI, is capable of pulling off sharp 2-second long handheld exposures for photography enthusiasts without the need for a tripod. Other neat features include an auto panorama mode that automatically stitches together a panorama when held up high. All the users has to do is tap the shutter button on the handle and the Osmo swivels to click 3 high-resolution images for stitching. The camera can also capture slow motion shots at 120 frames-per-second (fps) up to 1080p.

DJI will sell the Osmo both separately (handle alone) or with the standard Zenmuse X3 fitment that starts from Rs 69,999 in 10 metro cities including Mumbai, New Delhi, Bangalore, Chennai and will also ship the Osmo anywhere in India through DJI’s authorised distributor, SSTPL.



Swatch, Visa launch pay-by-wrist watch venture

swatch-624x351



Swiss watchmaker Swatch SA, Visa Inc and Visa Europe have launched a project that lets Visa cardholders in the United States, Switzerland and Brazil make payments with Swatch’s new “pay-by-the-wrist” Swatch Bellamy watch.

Set to launch in early 2016, Swatch Bellamy can be used around the world wherever contactless near-field communications (NFC) Visa payments are accepted, the partners said in a joint statement.
An earlier report states that Swatch plans to add to its new smartwatch range. The Biel, Switzerland-based company is competing with Apple and other watchmakers in the budding smartwatch market.

“Our product is called Touch Zero One and that gives enough room for Zero Five, Zero Nine,” Nick Hayek was quoted as saying by Switzerland’s Tages-Anzeiger newspaper. “The Touch Zero One is not the end of the progression.”

Hayek told the paper Swatch would launch Touch Zero Two at next year’s Olympic Games in Rio de Janeiro.

With inputs from Reuters






Instagram currently testing support for multiple accounts on Android: Report

Instagram_640-624x351



Instagram will now support multiple accounts through its Android app. However, this features seems to be working only for a selected few. There is no news as to when this feature will roll out for iOS users. This turns out to be a great addition for social media managers and also, business owners who use multiple accounts on a daily basis for work and promotion.

According to a report by Android Police, Instagram is testing the feature on Google’s Android OS right now and one can access by joining the Instagram beta program or by downloading the APK file. The feature is reportedly live on version 7.12.0, which will be available to anyone on the Instagram Android beta.

For users who are lucky enough to have the feature, will see an ‘Add Account’ option below Clear Search History. Clicking this option will offer users the ability to create a new account from scratch. Once this is done, the user will find a selector next to the account nickname on the top of your profile page which will allow the user to choose between the accounts.

A recent report pointed out that Indians on Instagram are mostly young, mobile-first users with high spending power, according to an Instagram study that revealed insights for the first time about the community connected to the social platform.

Instagram also said its monthly actives in India have more than doubled over the past year, as of September this year. Instagram continues to build momentum and has grown to more than 400 million users this year. Among the last 100 million to join Instagram, more than half live in Asia and Europe.










Samsung Galaxy S7 chipset shatters AnTuTu benchmark

Samsung-Galaxy-S6-edge-1-624x351



Samsung’s upcoming Galaxy S7 may not have many features to show off at its future announcement, but the flagship smartphone will certainly have the fastest chipset around, as an AnTuTu benchmark result points out.

Samsung’s latest and greatest chipset is the much-talked about Exynos 8890. The SoC supposedly packs in eight cores and according to the leaked benchmark, produced a score of 103,692 points says GSMArena. In comparison, the recently announced Huawei HiSilicon-made Kirin 950 SoC that also packs in eight cores scored only 79,000 points.

Indeed, Samsung seems to be gunning for the Qualcomm Snapdragon 820, that is expected to be really powerful with its eight core setup and custom Kyro cores. Qualcomm even seems to have rectified the heat problems, so these could begin to appear at smartphone announcements soon.
Coming back to the Samsung Galaxy S7’s Exynos 8890 SoC, it did make an appearance online back in September as well. Back then, it took up the Geekbench test and scored an earth shattering 2294 points on the single core run and 6908 on the multi-core test.

In a broader comparison, Apple’s iPhone 6s, which is the fastest Apple smartphone yet, scored a 2,535  in the Geekbench single core test while the multi-core test revealed a score of 4,404 (it has just two cores). Still then, Apple could turn out to be the leader next year when if it keeps the performance jumps between past iPhones consistent.


















Here's How Google Can "Remotely Bypass" Pattern Lock Of Android Device



Older versions of Android can be remotely reset by Google if the company is issued with a court order, but only if they're locked using a pattern. 

This is according to a document prepared by the New York District Attorney's Office which revealed just how easily investigators could see the contents of a device.

Devices running Android 5.0 and newer cannot be remotely reset as they use full disk encryption.

However, this option is not switched on by default.

The report found any device using an older version of the operating system is vulnerable to remote reset and according to the Android Developer Dashboard, this is 74.1 per cent of Android devices currently being used.

However, this figure is slightly misleading. 

The remote reset feature does apply to phones running operating systems before Android L, but it only applies to people how have secured their device with a pattern.

Google can't remotely reset phones secured with a PIN or passcode, meaning the number of affected devices could be lower.  

A post from Google's Adrian Ludwig attempted to clarify the situation.
He said: 'Google has no ability to facilitate unlocking any device that has been protected with a PIN, Password, or fingerprint. 

'This is the case whether or not the device is encrypted, and for all versions of Android.

'Google also does not have any mechanism to facilitate access to devices that have been encrypted (whether encrypted by the user, as has been available since Android 3.0 for all Android devices, or encrypted by default, as has been available since Android 5.0 on select devices).

'There are some devicesthat have been configured to use a "pattern" to unlock. Until Android L, "pattern" unlock did provide a recovery option with the Google account. 

'This recovery feature was discontinued with Android L.

'Also, the lost pattern recovery feature never applied to PIN or Password so if you are on an earlier model device and don't want to use the pattern recovery feature, you can switch to a PIN or Password and it will be disabled.' 

However, the report insists that forensic examiners are able to bypass passcodes on devices using a 'variety of forensic techniques.'

NSA to shut down bulk phone surveillance program by Sunday



The National Security Agency will end its mass metadata surveillance program this weekend, two and a half years after Edward Snowden’s revelations. However, he NSA’s replacement “reasonable compromise” is far from being celebrated by privacy advocates.
Signed into law this past June, the USA Freedom Act requires that by 11:59pm EST on November 28, the NSA must cease its bulk collection of telephony metadata. The NSA is ready to move ahead with a different program, also ordered by the law, at the same time.
No longer will the NSA rely on the Patriot Act’s Section 215 to collect all phone records. Instead it will have to contact telecommunications companies holding the data for them. Unlike general warrants leaked by former NSA contractor Edward Snowden such as the one issued by the Foreign Intelligence Surveillance Court (FISC) granting the NSA access to all Verizon customers’ records, the new program only allows the NSA to collect records from telecoms when a “specific selection term” pertaining to limited data is outlined in a FISC warrant, which will limit investigations of the metadata to six months.
The move has encouraged a wide variety of opinions to be voiced.
"The act struck a reasonable compromise which allows us to continue to protect the country while implementing various reforms," Ned Price, a spokesman of the National Security Council, an advisory group to the US President, told Reuters.
Meanwhile, Alex Abdo of the American Civil Liberties Union told the Baltimore Sun that “the ending of the phone records program may in the future seem to be more a symbolic victory, given it was the first major concession the intelligence agencies had to make.”
While privacy advocates described the change as only a single step with the prospect of more progress to come, lawmakers adopted a tone of finality.
"I think we have the balance right," Representative C. A. Dutch Ruppersberger (D-Maryland) told the Sun. Ruppersberger has called Snowden a traitor and was ranking member of House Permanent Select Committee on Intelligence when the leaks were published.
Marcy Wheeler, a national security blogger, disagreed strongly. Wheeler wrote that the USA Freedom Act expands on, rather than replaces, what the NSA interpreted Section 215 as authorizing. What’s more, a separate executive order is in place, she says, to run parallel to the bulk metadata collection.
“Right now, the Section 215 phone dragnet is not getting some cell records, probably not getting all VOIP, and probably not getting non-telephony messaging,” Wheeler wrote on the Empty Wheel blog, adding “just a tiny corner of the phone dragnet will shut down, and the government will continue to collect telephony metadata records in bulk … including records of both U.S. and non-U.S. persons’ under EO 12333,” in reference to an executive order issued in 1981 by President Ronald Reagan.
Although the bulk metadata collection is coming to an end, what’s already been collected will not be immediately destroyed, as an NSA request to keep the metadata until the end of February 2016 is under FISC consideration. The White House told Reuters the NSA still needs limited access to it, not for analytical purposes but “data integrity purposes,” while the reliability of the new focus-oriented program is monitored.
This month, a federal court found the soon-to-end program unconstitutional, ordering that the past data be destroyed. However, an appeals court stayed that ruling out of national security interests. Larry Klayman, founder of public interest groups Judicial Watch and Freedom Watch, has been in court with the NSA since 2013 over its mass surveillance, and he says his case depends on that data not being destroyed.
On Wednesday, FISC fulfilled another part of the new surveillance law, adding five advisers to a panel, known as an amicus curiae in legal-speak, to offer legal advice from a perspective promoting civil liberties when applicable to a warrant request. The panel consists of four lawyers and a law professor.

Vulnerability Discovered That Exposes Real IP-Addresses Of "Vpn Users"


We live in a world where everything we say, everything we do, everyone we talk to, everything we watch on the internet, every expression of creativity, or love, or friendship is recorded.We can be tracked by a many different organizations. 
By simply visiting a website can allow its operators to figure out your general physical location, identify details about your device information, and install advertising cookies that can track your movements around the Web.

So we often use VPN to hide our IP address while surfing the internet to maintain online anonymity, to access geo-restricted content, Bypass Government Censorship, Torrent Downloading(in some countries).

But a new vulnerability discovered can reveal real IP-addresses of VPN users with relative ease. The issue, that affects all VPN protocols and OS, was uncovered by "Perfect Privacy" who alerted many affected VPN providers to the threat before making it public.

For the past many years interest in encrypted and anonymous communications has increase to a far wider audience.VPN suppliers are significantly prominent among BitTorrent users, who by default broadcast their IP-addresses to many individuals once downloading a preferred file.

The goal of VPN is to protect one’s ISP IP-address, however a freshly discovered vulnerability shows that this can be simply bypassed on some providers.

The problem, uncovered by VPN provider Perfect Privacy, is a port forwarding trick. If an hacker/attacker uses a similar VPN than the victim actual IP-address is exposed by forwarding traffic on a particular port.

The security flaw affects all VPN protocols together with OpenVPN and IPSec and applies to all OS.

“Affected are VPN providers that provide port forwarding and don't have any protection against this specific attack,” Perfect Privacy notes.

For example, if an attacker activates port forwarding for the default BitTorrent port then a VPN user on a similar network can expose his or her real IP-address.

The same is true for normal internet traffic, however in this case the attacker needs to direct the victim to a page that connects to the forwarded port, as Perfect Privacy explains it.

The vulnerability affected many VPN providers, who were warned last week. This includes Private Internet Access (PIA), Ovpn.to and nVPN, who have all fixed the problem before public disclosure.

PIA’s Amir Malik said that their fix was comparatively easy and was enforced swiftly once they were notified.

“We enforced firewall rules at our VPN server level to block access to forwarded ports from clients’ real ip addresses. The fix was deployed on all our servers within twelve hours of the initial report,” 
In addition, PIA complimented Perfect Privacy for responsibly revealing the vulnerability before disclosing it public and awarded their competitor with a $5,000 bounty under its Whitehat Alert Security Program.

Motorola Moto 360 (2nd gen) coming to India on 1 December

Motorola-360-2015-Sport-624x351



Motorola has set the date for the launch of its much-awaited successor to the original smartwatch, the Moto 360 (2015). The date is set for the 1 December and Motorola has already pushed out media invites for the same.

The successor to the original Moto 360 was announced back at the IFA Berlin. The smartwatch comes in a slimmer package and in a total of three variants, all of which are expected to be announced on 1 December.

Other changes on the new 2015 Moto 360 include the button being shifted to the 2 o’clock position, while colour options now include gold, shiny chrome and metallic black finishes. The display now occupies 71.1 percent of the front face. Other Moto customisations include Live Dials, a feature that gets you quick access to apps directly from the watch face much like the complications feature on the Apple Watch.

The three variants of the Moto 360 2015 include a men’s version in (42 mm and 46 mm), a woman’s variant (42 mm) and the Sports variant that has been designed for fitness users. Price for the first two are expected to start from $299 (approximately Rs 20,000) all the way up to $499 (approximately Rs 34,000).




















Here's How Malware Researcher Found "Malware" In Android Smartphone In "PNG" Image File.

Android malware drops Banker from PNG file

Meanwhile I found same or very similar version of this Trojan dropper and banker without obfuscation and protection by DexProtector. Dropping method and functionality is preserved. For those interested, I added hashes of infected files at the bottom.

Nowadays is malware trying to hide wherever it is possible to get under the radar of anti-virus companies. Lately I found Trojan dropper carrying malicious payload, encoded by base64, embedded inside an image file. It’s nothing special these days but it is very rare dropping technique. In the most cases are malware authors lazy enough to not even encrypt the payload file.

Analysis


In the time of writing this blog post is this Trojan dropper still available to download from attacker server (hxxp://jackdojacksgot.ru/img/Update.apk). Based on VirusTotal is detection for this Trojan dropper very poor.



Figure 1 VirusTotal detection

This malicious application masquerade itself as Adobe Flash Player. Based on alternative names I found in application resources malware name can be different in the other versions like: Viber NewApp4porno,CommBankMy Online SecurityViber or Whatsapp.   


Figure 2 Possible Trojan dropper names

After launch, Trojan will immediately drop and request user to install Adobe Flash Player. But first let’s take a look on dropping technique.
In app assets there is nothing else to drop other than image file. 



Figure 3 Trojan dropper assets


There is only one image of dices stored in assets, but it size is more than 3.6 MB and that’s bit suspicious.
After inspecting the code application wasn’t dropping this PNG file. The Trojan dropper at first opens this image file and searches for delimiter string, in this case "12345678901234567890". Right after this delimiter is stored another application encoded by Base64.


Figure 4 Dropping embedded malware


Figure 5 Binary view of PNG file


Decoded data are then stored on external storage as “prefix.apk” and demand to install. Decoded application, prefix.apk, is heavily obfuscated Android banker, stealing user credentials.
After installation it requests user to activate Administrator rights for application. This is the simplest method that prevents to uninstall this Trojan. 


Figure 6 Banker install and device administrator request


If user tries to deactivate Administrator rights then is repeatedly asked to activate it again. There are two ways how to get rid of this nasty banker. Either by going to safe mode of your device and deactivate Administrator rights and uninstall it or by using Android Debug Bridge (adb) and uninstall it from your computer.
Both apps Trojan dropper and dropped banker are the most probably obfuscated and protected by DexProtector. It’s very complicated to analyze it statically without any dynamical intervention. 


Figure 7 Code obfuscation

Banker can steal user login credentials or credit card information with phishing technique. When user opens his mobile banking application or just Google Play Store, malicious activity will be displayed on the top of the official application. This way user can be easily fooled and insert sensitive information to banker pop-up window. 


Figure 8 Bankers phishing windows


User credentials are immediately sent to remote server.


Figure 9 Send stolen credentials for Gmail app


Figure 10 Send stolen credentials for CommBank app


Figure 11 Send stolen credentials for PayPal app

This banker is very popular. Lately I tweeted about same banker but stored on different server.  



More information


HASH dropper:     1F41BA0781D51751971EE705DFA307D2
HASH PNG:         575551FBC343EC8E1A1C771D81963096
HASH dropped:     90886B56372F5191A78A20DCB3F9FE6E
Remote server:      75jng75ufnf.ru:2080


Not obfuscated samples by DexProtect:

HASH dropper:     E3CCAA1EF68CC472AB8983419BE15A49
HASH dropper:     D4FAA81ABA663A825BB13F17E3CE3D07
HASH PNG:         6F394038D39F76F4475E1B98AD186A40
HASH PNG:         BEDC1B7A2ED127C5A7E5261F043CAFE4

Source:b0n1.blogspot.com

A Hacking Scripts,Which Secretly Automate A Lot Of His Job


There's a hilarious project that's popular on GitHub, the website that hosts all kinds of software that programmers want to share with each other.
The project was shared by a programmer named Nihad Abbasov, known as "Narkoz" on GitHub. It consists of a bunch of software scripts with some funny but NSFW names. Narkoz says that the scripts came from one of his coworkers who left for another company, the type of guy that "if something - anything - requires more than 90 seconds of his time, he writes a script to automate that."
smack-my-bitch-up.sh - sends a text message "late at work" to his wife (apparently). Automatically picks reasons from an array of strings, randomly. Runs inside a cron-job. The job fires if there are active SSH-sessions on the server after 9pm with his login.
kumar-asshole.sh - scans the inbox for emails from "Kumar" (a DBA at our clients). Looks for keywords like "help", "trouble", "sorry" etc. If keywords are found - the script SSHes into the clients server and rolls back the staging database to the latest backup. Then sends a reply "no worries mate, be careful next time".
hangover.sh - another cron-job that is set to specific dates. Sends automated emails like "not feeling well/gonna work from home" etc. Adds a random "reason" from another predefined array of strings. Fires if there are no interactive sessions on the server at 8:45am.
fucking-coffee.sh - this one waits exactly 17 seconds (!), then opens an SSH session to our coffee-machine (we had no frikin idea the coffee machine is on the network, runs linux and has SSHD up and running) and sends some weird gibberish to it. Looks binary. Turns out this thing starts brewing a mid-sized half-caf latte and waits another 24 (!) seconds before pouring it into a cup. The timing is exactly how long it takes to walk to the machine from the dudes desk.

Nmap7:The New Version Of Nmap Released After 3.5 Years



Three and a half years after the release of version 6, the developers of the Nmap Security Scanner announced this week the availability of Nmap 7.0.0.

Nmap, a Network Mapper, is a free and open source tool designed for network discovery and security auditing. The utility is available for all major operating systems and it is  highly useful for identifying target operating system,ping|tcp|udp|syn scan,pentesting malware-infected, unauthorized, and vulnerable devices on a network.

According to the Nmap Project, Nmap 7 After 3.5 years of work by more than 100 contributors and 3,200 code commits since Nmap 6 which is previous versions.

One of the most important enhancements is related to the Nmap Scripting Engine (NSE), which allows users to create scripts designed to automate networking tasks. More than 170 new scripts have been added since the release of version 6, bringing the total count to 515.

Nmap 7 also brings faster scans, improved IPv6 support, faster and better SSL/TLS-related scans, and an updated version of the Ncat utility.

Nmap Security Scanner 7 can be used on Microsoft’s latest operating system, Windows 10, but it also works on older versions, such as Vista and even XP, although the developers recommend against the outdated OS. In the case of Mac operating systems, Nmap runs on OS X 10.8 Mountain Lion through 10.11 El Capitan. Support for IBM’s AIX and Oracle’s Solaris UNIX operating systems has also been updated.

The Nmap Project says it has also made some improvements to its infrastructure to ensure that it can handle a growing user base. The official website, nmap.org, has been moved to HTTPS, and an official bug tracker has been launched on GitHub.
In total, 330 significant improvements have been made to the scanner since the last major release.

The release of Nmap 7 comes shortly after the developers of Wireshark, the popular network protocol analyzed used by many security researchers, announced the availability of version 2.0.

Wireshark 2.0 comes with a new user interface for enhanced user experience, new and updated features, API changes, and many bug fixes.

Android Adware Can Install Itself After Being Denied By User.

Researchers have discovered a malicious apps which can get installed on android device even when a user has specifically tapped a button rejecting the app.

The hijacking take effect once a user has installed a trojanized app that disguises iitself as an Play-Store app and then it appears in third-party markets. Throughout the installation, apps from an adware family called Shedun attempt to trick individuals into granting the app management over the android Accessibility Service, that is intended to grant vision-impaired users alternate approach to act with their android mobile devices. Ironically adequate, Shedun apps attempts to gain such authority over the devices by displaying dialogs like this one, that assure to assist to get rid of such invasive

advertisements.
The following video shows the forced installation in action.


From that time on, the app has the power to show pop-up ads that install extremely invasive adware. Even in cases wherever a user rejects the request to install the adware or even ignores the request, the Shedun-generated app uses its management over the accessibility service to install the adware anyway.

"Shedun does'nt exploit a vulnerability in the service," researchers from mobile security company Lookout wrote in a blog. "Instead it make use of the service’s valid features. By getting the authorization to use the accessibility service, Shedun can now read the text that emerges on the screen, Confirms if an application installation prompt is shown, scroll through the permission list, and eventually, tap the install button without any touching or physical interaction from the user."

Shedun is one of the variant of adware that can't be easily uninstalled that's due to the apps that root the device and then insert itself into the system partition to ensure they remain in the user device even when the device is factory reset.


Lookout labelled them as "trojanized adware" because the ultimate goal of this malware is to install secondary apps & serve aggressive advertising. 
The ability to use social engineering to hijack the Android Accessibility Service is one more sign of the ability and ingenuity placed into this new variant of application. So User Should anxiously weigh the risks and advantages of installing apps from this third-party app markets. User should also be extremely suspicious of any app that asks for accessing control over the Android Accessibility Service.