This article is ridiculous.
If Google's Android apps had malware, I think we knew that by now
Android is open but it doesn't mean that any app can do whatever they want.
Even anti-malware software apps can't do much since they are just regular apps and don't have the right to control other apps (except if pre-installed on the device as a system app or if the device is rooted).
No. That is not true. Everyone knows in the industry that this problem exists. Even Apple Store fights with this daily despite having the practice of personally approving the apps. Let them fix their problems.
The article title is scary ... but is the malware a technical violation of data privacy (consolidating data without explicit permission) or is it actually capturing and exploiting private data for identity theft or other illegal activities? More details are needed to determine whether these are scare tactics laying the groundwork to justify selling scanning software or a representative sampling of compromised Androids.
There are shades of grey here.
We unofficially and maybe unconsciously contract with Google and other Web 2.0 companies when we use their Web services, letting them data mine our preferences.
With malware third parties that run the gamut from entrepreneurs to those with malicious intent try to jump on the bandwagon as it rides past. So far the damage has not been great enough to drive people away, but...
The entire business model of Android for Google revolves around gathering your private information so that they can show you more targeted ads. So
All Android phones are intended to collect your private data in a supposedly anonymous way. When google itself do this, can you blame the 3rd party app developers on taking your private data and trying to monetize it? Thats why all enterprise customers go for iOS/Blackberry.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.