![]() |
Re: How to save infected Android tablet?
Quote:
|
Re: How to save infected Android tablet?
Quote:
|
Re: How to save infected Android tablet?
Quote:
|
Re: How to save infected Android tablet?
Quote:
Sorry, I was referring to NATIVE applications on Sailfish. We don't grant permissions or such like Android. We have no malware yet as far as I know probably because there are so few users so the target is too small to bother with. My **guess** is it might be easier to write malware for Sailfish due to the lack of any security model. |
Re: How to save infected Android tablet?
I guess some people here might argue that Android is malware in itself...
|
Re: How to save infected Android tablet?
Quote:
|
Re: How to save infected Android tablet?
Quote:
|
Re: How to save infected Android tablet?
Quote:
Quote:
If anyone from Jolla reads this please take note, here's some Android crapola Sailfish really needs to avoid: When I uninstall an app I don't expect any app or service to be allowed to reinstall it When I cancel an install dialog I expect that decision to be final, I don't want the dialog to be allowed to reappear and ask me again one second later over and over and over If I'm using a system screen (e.g. settings) no background app should be allowed to bring up a modal image/dialog over the top of it When I turn the wifi (gps/bt/...) off in settings no app should be allowed to turn it back on again without my explicit approval (and, as above, if I say no don't ask again) Really, I could go on and on... :( Honestly, there's so much m0r0n1c shite in Android I wonder if the chumps who developed it have any experience of the outside world. |
Re: How to save infected Android tablet?
Interesting times when even a android malware removal question turns into a SFOS security discussion...
|
Re: How to save infected Android tablet?
Hudl is alive :D
I installed Eset from the Play store, after installing I tried turning off the wifi but each time I turned it off the malware turned it on again so I used my router to block the MAC id of the Hudl. That immediately subdued many of the pop up ads that had been bombarding me but I was still getting lots of install dialogs for 'porn hub', 'sexy girls', etc... popping up repeatedly. I performed a scan (all the while dismissing more install dialogs). Although Eset failed to kill off the malware it did create a log of all the problems it had identified. I went into Settings->Apps->All and pressed 'Force Stop' and 'Disable' for all the items Eset had listed and some others that looked like they weren't from Google. That killed off the bombardment of install dialogs. I then went back to the router and allowed the Hudl back on the network, went to settings and checked the box to allow install of apps from sources other than the play store and then downloaded and installed Kingo Root from download.com. Not only did Kingo Root successfully root the Hudl but it has a SuperUser feature that allows you to delete apps and services. I went through the log from Eset and used SuperUser to delete all that I could. There were three items that even SuperUser could not uninstall but so far they have remained disabled even after reboots. The Hudl is now running fine and Eset is not reporting any threats. :) |
All times are GMT. The time now is 09:59. |
vBulletin® Version 3.8.8