SEARCH KEYWORD -- Android security



  Android IDE gets Pie-Friendly Update

An integrated development environment (IDE) provides facilities to computer programmers for software development. It consists of a source code editor, builds automation tools, and a debugger. The aim of the IDE is to reduce the configuration necessary to piece together multiple development utilities.The android application development process has become easier with the advancement of the new technologies. There are many considerations that are taken into account before developing an application....

       2018-09-26 07:41:56

  25 worst passwords in 2012

Weak password is a serious security vulnerability, but the majority of network users still use some universal simple character sequences as the password. SplashData recently announced the world's worst password list in 2012.  "password","123456" and "12345678" are still at top places, while others have varying,  some new passwords like  "welcome" "Jesus" "ninja","mustang"and "password1 "are in the list. With the risk of password loss, SplashData CEO Morgan Slain said we hoped netw...

   Password,Security     2012-10-25 12:04:49

  Google is returning back to China

It has been five years since Google announced its difficult decision to leave China in 2010. The well known reason was that Google didn't want to conform to China's censorship request on sensitive information. During these five years, many stories happened bbetween these two sides. Things may turn around now as there are a few indications where Google may return back to China at an appropriate time soon. The most convincing indication is that a customized Google play -- Google online shop may a...

   Google,China,Alphabet,Google play     2015-09-06 04:13:30

  The Risks of Prioritizing Features Over Security in China's EV Industry

In recent years, China's electric vehicle (EV) industry has seen a surge in innovation and growth. Companies like BYD, NIO, XPeng, and Xiaomi have become household names, not just in China but globally. These companies have been at the forefront of integrating cutting-edge technology into their vehicles, often promoting new features such as autonomous driving, advanced infotainment systems, and seamless connectivity. However, this rapid pace of innovation has raised concerns about whether these...

   SECURITY,CHINA,EV CAR     2024-11-20 01:14:18

  Different types of keystore in Java -- PKCS11

PKCS11 keystore is designed for hardware storage modules(HSM). It's an interface to talk to the HSMs. It doesn't actually store any keys but provide a set of classes to communicate with the underlying HSM. The actual keys and certificates are stored on the HSMs. The reason for storing the keys and materials is to ensure security and efficiency. Since the keys are on the HSMs, they are safe to be stolen. All encryption/decryption operations are performed on the HSMs as well, this incre...

   PKCS11,keystore,HSM,Java     2015-01-08 00:39:12

  30 minutes to fix Java vulnerability

On September 25, Adam Gowdiak from the Polish security consulting firm Security Explorations submitted a Java security vulnerability to Oracle and provided a proof-of-concept. The vulnerability exists in Java 5 6,7, once the user accesses hosted malware site, an attacker can remotely control the infected machine.Gowdiak later got in touch again with Oracle and got the response that the fix has reached the final stage. He can expect the patch in four months later. He eventually unbearable Oracle'...

   Java, Vulnerability,Fix     2012-10-29 11:53:43

  Can API be copyrighted? At least Oracle hopes so

  The result of the lawsuit case war between Oracle and Google is clearer now. The court said that 9 lines of code of Android has violated intellectual property right, these 9 lines of code can be ignored relative to the number of codes for the whole Android system. But just like LinuxToy points out that the reasons why this case catches so much attention are : 1). The amount of money Oracle asked from Google is $1 billion; 2). The statement says Java language itself doesn't violate the int...

   Oracle,Google,API,Copyright,Lawsuit case     2012-05-11 00:47:58

  JS code to check different mobile devices

Today I come across a code snippet which uses JavaScript to check different mobile devices and then loads different CSS files accordingly. As we know that there are mobile devices with different screen sizes, it's always troublesome for web developers to develop cross browser and cross device compatible codes. Hope this one can help those who develop web apps on mobile devices. // Check whether it's a mobile device // wukong.name 20130716 if(/AppleWebKit.*Mobile/i.test(navigator.userAgent) || (...

   JavaScript,Mobile device,Detection     2013-11-28 05:25:10

  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy.  Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk.  But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...

   DATA SECURITY,VPN     2020-01-30 07:33:29

  WeChat 5.0 is coming soon

WeChat 5.01 now is available on App Store, but on Android, you still need to wait for some more time. If you want to experiment with new features of WeChat 5.0 now and you are using Android, you can request a beta version of WeChat 5.0 through here .Let's check out the new features first. WeChat 5.0 adopts the popular flat design, it focus on game platform. Main features are: You can play games with friends in game center Add bank account to pay with WeChat New bookmark function, you can bookm...

   WeChat 5.0,New fetuares     2013-08-04 22:42:45