>From - Sat Mar 02 00:57:27 2024
Received: by 10.236.192.164 with SMTP id i24mr4836998yhn.8.1330109398077;
Fri, 24 Feb 2012 10:49:58 -0800 (PST)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.101.203.37 with SMTP id f37ls2724027anq.9.gmail; Fri, 24 Feb
2012 10:49:53 -0800 (PST)
Received: by 10.101.5.35 with SMTP id h35mr1429879ani.20.1330109393349;
Fri, 24 Feb 2012 10:49:53 -0800 (PST)
Received: by 10.101.5.35 with SMTP id h35mr1429869ani.20.1330109393170;
Fri, 24 Feb 2012 10:49:53 -0800 (PST)
Return-Path: <areda..._at_msn.com>
Received: from snt0-omc2-s5.snt0.hotmail.com (snt0-omc2-s5.snt0.hotmail.com. [65.55.90.80])
by gmr-mx.google.com with ESMTP id g10si3191022yhn.7.2012.02.24.10.49.52;
Fri, 24 Feb 2012 10:49:52 -0800 (PST)
Received-SPF: pass (google.com: domain of areda..._at_msn.com designates 65.55.90.80 as permitted sender) client-ip=65.55.90.80;
Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of areda..._at_msn.com designates 65.55.90.80 as permitted sender) smtp.mail=areda..._at_msn.com
Received: from SNT107-W14 ([65.55.90.71]) by snt0-omc2-s5.snt0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675);
Fri, 24 Feb 2012 10:49:52 -0800
Message-ID: <SNT107-W147D1EBF71847E3CC999E3BC6A0_at_phx.gbl>
Return-Path: areda..._at_msn.com
Content-Type: multipart/alternative;
boundary="_159b55b5-dced-4646-b2cc-1b6b7a5aa5c7_"
X-Originating-IP: [97.82.27.213]
From: Its from Onion <areda..._at_msn.com>
To: tscm-l2006 <tscm-..._at_googlegroups.com>
Subject: widespread China-based cyber espionage operation
Date: Fri, 24 Feb 2012 18:49:52 +0000
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 24 Feb 2012 18:49:52.0156 (UTC) FILETIME=[179015C0:01CCF325]
--_159b55b5-dced-4646-b2cc-1b6b7a5aa5c7_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
http://www.latimes.com/business/technology/la-fi-tn-cyber-security-crowdstr=
ike-20120223%2c0%2c4645028.story=20
Just as U.S. companies are coming to grips with the threats to their comput=
er networks emanating from cyber spies based in China, a noted expert is hi=
ghlighting what he says is an even more pernicious vulnerability in smartph=
ones.Dmitri Alperovitch, the former McAfee cyber security researcher who is=
best known for identifying a widespread China-based cyber espionage operat=
ion he dubbed "Shady Rat," has used a previously unknown hole in smartphone=
browsers to deliver an existing piece of China-based malware that can comm=
andeer the device, record its calls, pinpoint its location and access user =
texts and emails. He conducted the experiment on a phone running Google's A=
ndroid operating system, although he says Apple's iPhones are equally vulne=
rable.
=09=09 =09 =09=09 =20
--_159b55b5-dced-4646-b2cc-1b6b7a5aa5c7_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style></head>
<body class=3D'hmmessage'><div dir=3D'ltr'>
<pre style=3D"line-height: 17px; white-space: normal; color: rgb(42, 42, 42=
); background-color: rgb(255, 255, 255); "><br><a href=3D"
http://www.latime=
s.com/business/technology/la-fi-tn-cyber-security-crowdstrike-20120223%2c0%=
2c4645028.story" target=3D"_blank" style=3D"color: rgb(0, 104, 207); cursor=
: pointer; ">
http://www.latimes.com/business/technology/la-fi-tn-cyber-secu=
rity-crowdstrike-20120223%2c0%2c4645028.story</a> <br><br>Just as U.S.=
companies are coming to grips with the threats to their computer networks =
emanating from cyber spies based in China, a noted expert is highlighting w=
hat he says is an even more pernicious vulnerability in smartphones.Dmitri =
Alperovitch, the former McAfee cyber security researcher who is best known =
for identifying a widespread China-based cyber espionage operation he dubbe=
d "Shady Rat," has used a previously unknown hole in smartphone browsers to=
deliver an existing piece of China-based malware that can commandeer the d=
evice, record its calls, pinpoint its location and access user texts and em=
ails. He conducted the experiment on a phone running Google's Android opera=
ting system, although he says Apple's iPhones are equally vulnerable.<br><b=
r></pre> =09=09 =09 =09=09 </div></body>
</html>
--_159b55b5-dced-4646-b2cc-1b6b7a5aa5c7_--
Received on Sat Mar 02 2024 - 00:57:27 CST