Android “L” will improve system’s security

Nov 1, 2014
Android “L” will improve system’s security!

l

Smartphones became an integral part of our lives so quickly that many people still haven’t realized which threats came along with these smart pocketable helpers. The list is long: malicious programs for smartphone are able to steal money. If your device is stolen, thousands of photos, private messages and social network credentials fall into the wrong hands. It’s easy to constantly monitor a person using his/her smartphone as a beacon, and corporations face a huge risk of data leakage. Luckily for all of us, these risks are obvious beyond those individuals in the security industry. For example, Google developers take these risks very seriously and the upcoming release of the Android codenamed L will greatly improve the security landscape for this OS, which leads today in terms of mobile threats presence

Steal it if you can
Thieves love smartphones, because it’s easy to steal one and then sell it for a relatively substantial sum of money.  To quickly get rid of dangerous evidence, thieves perform a factory reset after a smartphone theft.  This trick will be harder to perform with the new Android L-based devices, as the factory reset will require a legitimate owner’s password, otherwise the smartphone will remain a useless brick.

Patch it quickly

As soon as Android became popular, it was criticized for its very slow and unreliable security patching. Any discovered security issue should be fixed in thousands of firmware variations from multiple vendors and carriers for each specific smartphone model, a large undertaking. No wonder that many critical issues were left unfixed for years (!).  Google will try to remediate this problem by delivering most security updates directly to end users via its own Google Play services and applying those updates without a complete firmware update. However, this feature will not be applicable to every Android smartphone and some issues can’t be resolved this way. But it’s better than nothing.

Keep the work-life balance

Many companies don’t allow Android smartphones for business purposes because of data leakage fears. These fears are legitimate, as Android malware is able to steal company information from a smartphone. The new Android for Work solution (which incorporates Samsung KNOX features) will address these issues by creating an encrypted storage and a virtual environment, basically, a smartphone inside a smartphone. After launching Android for Work, a user will see a “business home screen” with company-approved apps and can perform his/her duties using encrypted data and an encrypted Internet connection. One click ― and his/her personal home screen and apps are back. Private and work-related apps and data are fully isolated, e.g. the company email app cannot read users’ personal address book or photo library, and vice versa.
In addition to security improvements, this approach could potentially improve an employee’s work-life balance. Launching Android for Work requires extra actions, including password entry, thus making it less tempting to read emails on Sunday.

A convenient protection

In general, passwords are boring and obtrusive, but smartphones make it even more evident, as you have to unlock a smartphone every 5 minutes or so. Google aims to reduce this routine, identifying a legitimate owner by other means, if it’s possible. For example, a lock screen could be disabled, if an owner’s smart watch is nearby, indicating that owner himself is close as well.  Also, a user may define a “zone of trust”, e.g. home. Lockscreen is also disabled in such zones. Of course, every convenient workaround somewhat reduces the level of security, so every user must find his personal tradeoff between convenience and security.

androd-l-keynote

More privacy

Google developers briefly mentioned something called Universal Data Controls, a centralized tool helping a user identify items like which apps, what kind of his/her personal data and what should be blocked for an individual’s smartphone. Unfortunately, there are few details on the subject. We will have to wait until September to take a closer look at this function.
Read more ...

Google Android L 'Lollipop' Comes With Built-In 'Kill Switch Security Feature' to Secure Data in Case of Theft

Nov 1, 2014
Google Android L 'Lollipop' Comes With Built-In 'Kill Switch Security Feature' to Secure Data in Case of Theft



If you thought that the Android L operating system released on 15 October by Google is all about the new 'Material Design' user-interface, think again.
Those planning to use the Android L OS (after receiving Google's latest OS upgrade via the over-the-air mechanism) will benefit from having a smartphone/tablet that can not only do more but is also more secure thanks to the built-in 'kill switch' functionality.
Kill switch works like a factory reset protector, and ensures that your phone does not get reset, without keying-in a preset password.
You can use the latest feature, along with the 'remote lock' functionality that Google brought to the fore recently, to add maximum security to your Android smartphones.
Together the factory reset protector and remote lock features form a kill switch combination, and add extra levels of security to your devices running Android L 'Lollipop'.
Real-world illustration of kill switch
Just imagine you have lost your precious Android smartphone and the thief has your expensive device in his hands. The thief resets your phone, before you could remotely find your device and lock it.
What do you do? Hope and pray that your stolen phone somehow finds its way back to you, or lodge a complaint with the police.
In such a scenario, Android's remote find/wipe/lock features become worthless, as the thief has already factory reset your device.
This is where the latest kill switch combination comes into picture, and once this is enabled (optional for now) within your device, you get multi-layer protection.
You get to stop your stored data from being intruded-upon and misused by criminals.
As a last step, you can do a remote wipe of your smartphones, and ensure that stored data is not used unlawfully.
Keep in mind that stolen phones are useless if they cannot be factory-reset.
As if to add insult to injury, remote-locking (within the kill switch security functionality combo) adds an extra-layer of protection to your devices.
The kill switch feature combo within Android L should serve as a deterrent to people stealing smartphones.
Recently, Apple also updated its iOS platform with multiple security mechanisms, and Microsoft is also said to be exploring the possibility of introducing a kill switch combo within its Windows Phone operating system.
However, to check out/test kill switch, Android users need to upgrade their devices, to run Android L
Read more ...

5 Best Raspberry Pi Operating Systems Of All Time

Nov 1, 2014
5 Best Raspberry Pi Operating Systems Of All Time!


1. Raspbian

Raspbian is a free operating system based on Debian optimised for the Raspberry Pi hardware. An operating system is the set of basic programs and utilities that make your Raspberry Pi run. However, Raspbian provides more than a pure OS: it comes with over 35,000 packages, pre-compiled software bundled in a nice format for easy installation on your Raspberry Pi.

The initial build of over 35,000 Raspbian packages, optimised for best performance on the Raspberry Pi, was completed in June of 2012. However, Raspbian is still under active development with an emphasis on improving the stability and performance of as many Debian packages as possible.

2. Risc OS

RISC OS is a computer operating system designed in Cambridge, England by Acorn. First released in 1987, its origins can be traced back to the original team that developed the ARM microprocessor. RISC OS is owned by Castle Technology Ltd. Risc OS Open Limited (ROOL) manages the source code for this operating system. 

3. Plan 9

Plan 9 is an operating system kernel but also a collection of accompanying software. The bulk of the software is predominantly new, written for Plan 9 rather than ported from Unix or other systems. The window system, compilers, file server, and network services are all freshly written for Plan 9. Although classic Unix programs like dc(1), ed(1), and even troff(1) have been brought along, they are often in an updated form. For example, troff accepts Unicode documents encoded in UTF-8, as does the rest of the system.

Developed at Bell Labs starting in the late 1980s, its original designers and authors were Ken Thompson, Rob Pike, Dave Presotto, and Phil Winterbottom. They were joined by many others as development continued throughout the 1990s to the present.

Plan 9 has had four major releases over its lifetime, released in the years 1992, 1995, 2000 and 2002 respectively.

4. Android

The operating system that powered over 85 per cent of the smartphones we use today is also a good choice for running a Raspberry Pi board. It's open source nature and wide variety of features makes it useful for a number of purposes and gives a Pi much more power than it would usually have.

5. Arch

Arch Linux ARM is a distribution of Linux for ARM computers. We provide targeted kernel and software support for soft-float ARMv5te, and hard-float ARMv6 and ARMv7 instruction sets on a variety of consumer devices and development platforms.

Arch Linux ARM carries forward the Arch Linux philosophy of simplicity and user-centrism, targeting and accommodating competent Linux users by giving them complete control and responsibility over the system. Instructions are provided to assist in navigating the nuances of installation on the various ARM platforms; however, the system itself will offer little assistance to the user. 
Read more ...