DroidSheep Brings Session-Hijacking To Android Devices

Android: It was only a matter of time before an app like previously mentioned Firesheep came out for mobile devices to further prove how insecure many popular sites are. Like Firesheep, DroidSheep listens to network traffic and can capture session tokens.

This means people running DroidSheep can use victims’ accounts, gaining access to sites that don’t use a secured connection (there was recently news of a flaw in SSL and TSL that may make HTTPS vulnerable too, but that’s a separate issue). DroidSheep requires root privileges. While popular sites like Yahoo, Google and Facebook may not be vulnerable to DroidSheep, because of improved security measures, there surely are hundreds of others that are.

We’re not advocating you use DroidSheep; it’s just another reminder to assume that when you’re on a public network anyone may be able to sniff out and steal your cookies. Your best recourse is to use VPN or SSH tunnelling (see instructions for Android and iOS).

DroidSheep


The Cheapest NBN 50 Plans

Here are the cheapest plans available for Australia’s most popular NBN speed tier.

At Lifehacker, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.

Comments


One response to “DroidSheep Brings Session-Hijacking To Android Devices”

Leave a Reply