Google Prepares Security Team to Investigate Third-Party Apps

Google is preparing a new security initiative and building a new team with a single purpose — to investigate sensitive applications available through the Google Play Store. Google scans all Android apps for malware before uploading them to the Play Sto… Continue reading Google Prepares Security Team to Investigate Third-Party Apps

Facebook Privacy Glitch Gave 5K Developers Access to ‘Expired’ Data

Facebook has fixed a privacy issue that gave developers access to user data long after the 90-day “expiration” date. Continue reading Facebook Privacy Glitch Gave 5K Developers Access to ‘Expired’ Data

Facebook sues data analytics firm OneAudience over malicious SDK

Facebook says OneAudience paid developers to install its social-media-profile-looting SDK into their apps to get marketing data for clients. Continue reading Facebook sues data analytics firm OneAudience over malicious SDK

Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that.
Continue reading Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that.
Continue reading Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

Google throws bug bounty bucks at mega-popular third-party apps

If an app has more than 100 million installs, Google will pay for bugs, even if the app makers already have their own bounty programs. Continue reading Google throws bug bounty bucks at mega-popular third-party apps

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

The post What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? appeared first on Security Intelligence.

Continue reading What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?