Remove 2011 Remove Authentication Remove Libraries Remove Manufacturing
article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

since at least 2011. back in 2011. Play store app manipulation The final step of the infection is the injection of a shared library into the Play store app. This shared library allows Gooligan to manipulate the Play store app to download apps and inject review. Android malware. For example, DroidDream. RageAgainstTheCage.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

since at least 2011. back in 2011. Play store app manipulation The final step of the infection is the injection of a shared library into the Play store app. This shared library allows Gooligan to manipulate the Play store app to download apps and inject review. Android malware. For example, DroidDream. RageAgainstTheCage.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. The other thing I'll tell you is, I joined Codenomicon in 2011.