What Is the Azure App Service?
Aidan Finn discusses the Azure App Service, the heart of Microsoft’s platform-as-a-service.
The post What Is the Azure App Service? appeared first on Petri.
Collaborate Disseminate
Aidan Finn discusses the Azure App Service, the heart of Microsoft’s platform-as-a-service.
The post What Is the Azure App Service? appeared first on Petri.
This is the story of technology’s most important walled garden. Continue reading Apple’s Long History of Rejecting ‘Objectionable Content’ From the App Store
Researchers have demonstrated how a malicious app with two specific permission can stealthily compromise users’ Android devices. “The possible attacks include advanced clickjacking, unconstrained keystroke recording, stealthy phishing, the silent installation of a God-mode app (with all permissions enabled), and silent phone unlocking + arbitrary actions (while keeping the screen off),” the researchers, from Georgia Tech and the University of California, Santa Barbara, explained. The attacks The attack vector – dubbed “Cloak and dagger” – … More → Continue reading New class of attacks affects all Android versions
Google said a permissions flaw that puts Android users at heightened risk of malware, ransomware and adware attacks will not be fixed until the release of its next mobile OS, Android O. Continue reading Android Permissions Flaw Will Linger Until O Release
Researchers have found 234 Android applications that are constantly listening for ultrasonic beacons in the background, allowing companies to track users’ current location or their habits – without the users’ knowledge. They also found four stores in two European cities that use the technology for user location tracking, but still no use of ultrasonic beacons on TV channels and Top 500 Alexa websites. What is ultrasonic tracking, and how widespread is it? Ultrasonic audio beacons … More → Continue reading More and more apps equipped with ultrasonic tracking capability
A team of researchers from the University of Michigan discovered that hundreds of applications in Google Play Store have a security hole that could potentially allow hackers to steal data from and even implant malware on millions of Android smartphones.
The University of Michigan team says that the actual issue lies within apps that create open ports — a known problem with computers — on
Continue reading Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking
An often repeated piece of advice given to users of mobile devices says that they should stick to well-reputed, official app stores if they want to avoid malware. But while the chance of downloading malware from Google Play might be lower than the chance of doing the same through third-party Android app markets, it’s still easy to get saddled with iffy and outright malicious apps even if you only ever use Google’s official app store. … More → Continue reading Be careful on Google Play
With a newly developed toolsuite that can analyze Android apps and detect whether two or more of them can collude with each other to acquire information that they would otherwise not be capable of obtaining, a group of researchers has shed some light on an existing capability that could easily become a big problem in the future. Android apps can exchange data with each other, via the Inter-Component Communication (ICC) message passing mechanism and, according … More → Continue reading Through inter-app data sharing, Android apps can get your data without permission
Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully.
The post Do We Need to Worry About Shadow IT? appeared first on Security Intelligence.
Google has recently removed 132 Android apps from Google Play due to them containing hidden iFrames linking to malicious domains in their local HTML pages. But even though some of these apps were downloaded by thousands of users, the users were in no immediate danger. How come? For one, the malicious domains were sinkholed by the Polish CERT all the way back in 2013. Secondly, one of the infected pages attempted to download and install … More → Continue reading 132 compromised apps removed from Google Play