Tag: Android

  • Cloud Blog: Gemini models are coming to GitHub Copilot

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/gemini-models-on-github-copilot/ Source: Cloud Blog Title: Gemini models are coming to GitHub Copilot Feedly Summary: Today, we’re announcing that GitHub will make Gemini models – starting with Gemini 1.5 Pro – available to developers on its platform for the first time through a new partnership with Google Cloud. Developers value flexibility and control in…

  • Cloud Blog: Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/russian-espionage-influence-ukrainian-military-recruits-anti-mobilization-narratives/ Source: Cloud Blog Title: Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives Feedly Summary: In September 2024, Google Threat Intelligence Group (consisting of Google’s Threat Analysis Group (TAG) and Mandiant) discovered UNC5812, a suspected Russian hybrid espionage and influence operation, delivering Windows and Android…

  • Hacker News: SELinux Bypasses

    Source URL: https://klecko.github.io/posts/selinux-bypasses/ Source: Hacker News Title: SELinux Bypasses Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides an in-depth technical exploration of SELinux, specifically relating to its implementation, security mechanisms, and potential bypass methods on Android devices. This is significant for professionals in security and compliance who are focused on kernel-level…

  • Hacker News: When Samsung meets MediaTek: the story of a small bug chain [pdf]

    Source URL: https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Article-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf Source: Hacker News Title: When Samsung meets MediaTek: the story of a small bug chain [pdf] Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details a significant security vulnerability found in the boot chain of Samsung mobile devices using MediaTek System-on-Chips. The vulnerability, which can allow an attacker with…

  • The Register: Millions of Android and iOS users at risk from hardcoded creds in popular apps

    Source URL: https://www.theregister.com/2024/10/23/android_ios_security/ Source: The Register Title: Millions of Android and iOS users at risk from hardcoded creds in popular apps Feedly Summary: Azure Blob Storage, AWS, and Twilio keys all up for grabs An analysis of widely used mobile apps offered on Google Play and the Apple App Store has found hardcoded and unencrypted…

  • The Register: Qualcomm unveils Snapdragon 8 Elite with custom cores for Android phones

    Source URL: https://www.theregister.com/2024/10/22/qualcomm_snapdragon_8_elite/ Source: The Register Title: Qualcomm unveils Snapdragon 8 Elite with custom cores for Android phones Feedly Summary: New flagship SoC drops Arm and grows its own legs with Oryon During day one of Qualcomm’s Snapdragon Summit in Maui, Hawaii, it unveiled its latest flagship SoC, dubbed the Snapdragon 8 Elite. This marks…

  • Hacker News: RISC-V Announces Ratification of the RVA23 Profile

    Source URL: https://riscv.org/announcements/2024/10/risc-v-announces-ratification-of-the-rva23-profile-standard/ Source: Hacker News Title: RISC-V Announces Ratification of the RVA23 Profile Feedly Summary: Comments AI Summary and Description: Yes Summary: The ratification of the RVA23 Profile by RISC-V International marks a significant advancement in providing standardized extensions for RISC-V processors, notably in areas crucial for AI/ML and enterprise workloads. This profile enhances…

  • Cloud Blog: Introducing Google Cloud’s new Vulnerability Reward Program

    Source URL: https://cloud.google.com/blog/products/identity-security/google-cloud-launches-new-vulnerability-rewards-program/ Source: Cloud Blog Title: Introducing Google Cloud’s new Vulnerability Reward Program Feedly Summary: Vulnerability reward programs play a vital role in driving security forward. By incentivizing security research, vulnerabilities can be found and fixed by vendors before they are potentially exploited by malicious actors, protecting users and strengthening security posture. Also known…

  • Hacker News: Safer with Google: Advancing Memory Safety

    Source URL: https://security.googleblog.com/2024/10/safer-with-google-advancing-memory.html Source: Hacker News Title: Safer with Google: Advancing Memory Safety Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses Google’s strategic commitment to enhancing memory safety in software, revealing a two-pronged approach that includes increasing the adoption of memory-safe languages and improving the risk management of existing memory-unsafe languages.…