Poll: Will Carrier IQ influence your next handset purchase?

Although the story is still developing, it’s clear that some phones on certain carriers have app called Carrier IQ pre-installed; the app can capture nearly activity one takes with a smartphone. Will this situation cause you to think harder about your choice of smartphone or carrier?

Sprint admits receiving Carrier IQ data but says it’s not spying

Carrier IQ is feeding Sprint generalized data about how its customers’ smartphones perform on its network, Sprint has confirmed, but it said it does not snoop into the private contents of those phones. Sprint claims its using that information primarily to optimize its network.

Verizon: No Carrier IQ, No way

Verizon Wireless, the country’s largest mobile operator and Android device seller, does not install Carrier IQ’s keystroke-sniffing software in any of its phones and doesn’t use the now-controversial company’s data in way, company officials said. Now we wait for the other operators to sound off.

How to check if your Android phone uses Carrier IQ

More than 141 million smartphones are now running software called Carrier IQ that can log everything a user does and sees, including private web browsing, incoming texts and which buttons you press on the phone. Is your Android handset spying on you? Here’s how to check.

Are carriers logging every action on your cell phone?

After you buy a smartphone and data service, what you do with the device is your business, right? Maybe not. Pre-installed software from Carrier IQ can capture every activity behind the scenes. Here’s a video showing that you don’t have the privacy you thought you had.

Why Mac Security Matters: OS X Rootkit Hunter

OS X Rootkit Hunter LogoAfter blogging about the need to use and maintain an anti-virus solution for your OS X systems, an anonymous reply questioning the need to use security tools at all on OS X systems gave me pause. You do not need me to link to the numerous articles flying around the internets that report on how one reason switchers are flocking to OS X is because of the lack of prevalence of malware. Folks are tired of viruses, worms, trojans, etc. hammering their systems. They are even more harrowed by having to maintain vigilance over their anti-virus programs, hoping they are not too far out of sync with the current “DAT”. However, switching to run OS X to avoid running anti-virus programs may not be the wisest choice.

To answer the “do we really need security tools for OS X?” question in a slightly different way than you’ve seen from many technology pundits, I’d like to turn your attention to utility called rkhunter or “rootkit hunter”. As most TAB readers should know by now, OS X has it’s origins in Unix (the “darwin” base comes from FreeBSD), and most folks believe *nix variants (linux, FreeBSD, Solaris, etc) to be extremely secure, free of the problems that plague those sad, sad Windows users. If you fall into that camp, please take a moment and browse the Secunia FreeBSD 5.x artchives. Secunia reports show over 91 vulnerabilities, with critical ones impacting core services such as file sharing and remote access. This should not be surprising since Unix systems have been favorite targets for hackers as they provide such a powerful base to launch further exploits. One of the more gnarly hacks is the installation of a rootkit – a program that can take surreptitious control of your system. And, guess what: your Mac OS X workstation/server is susceptible to rootkits just like any other Unix system, even with Leopeard’s enhanced security features. How can you fight something you can’t even see? You need a tool to help. Modern anti-virus products can and usually do cover rootkits, but the rkhunter tool may cover additional rootkits and may update rootkit signatures more frequently than a traditional vendor.

I wouldn’t recommend trying to get rkhunter installed on your Mac since it will require some enhanced Terminal-fu. Thankfully, Christian Hornung understood the need for such a tool and built a wrapper for it called (surprisingly enough), OS X Rootkit Hunter [dmg], complete with installer. After installing the package, navigate to Applications->OSXrkhnter and run the “Rootkit Hunter” app.

It’s good practice to update the rootkit database (similar to a virus engine DAT update) before each scan since there may be new rootkit signatures from new or altered exploits. When you start the scan, you will see a password dialog – just as you would with any operation that requires additional privileges to run – since OS X Rootkit Hunter needs to look in places your normal account user account cannot. You will also see Terminal windows displaying a running report of what rkhunter has or has not found (since this front-end does not free you from all the gory details of what lies beneath Aqua).

OS X Rootkit Hunter (large)

While you can download and run OS X Rootkit Hunter, I would strongly suggest that less technical users obtain one of the commercially available malware scanners since the output from OS X Rootkit Hunter can be a bit daunting. The presence and history of this tool should be enough justification for the need to run security software on your systems.