Embedded Systems Conference
Breaking News
Comments
Newest First | Oldest First | Threaded View
Page 1 / 5   >   >>
MaxMindor
User Rank
Author
solution
MaxMindor   8/7/2014 10:42:56 AM
NO RATINGS
There are a lot of vulnerabilities in mobile systems and it is very important to keep in mind that anyone can create an application and upload it on Google Store. That`s why having a good antivirus like http://www.trendmicro.com/us/home/products/mobile-solutions/android-security/index.html on your smartphone can prevent it from accessing personal data.

Saon Islam
User Rank
Author
re: More than a third of Android apps host malware
Saon Islam   8/29/2012 6:56:06 AM
NO RATINGS
Android users beware, more than 50 mobile apps in the official Android Market have been discovered containing malware that could have compromised sensitive and personal data. While Google has already yanked the apps from the Market, this first big infection highlights the inherent vulnerability of Android's openness to developers. Check here for more info http://drawsomethingcheat.eu

Nicholas.Lee
User Rank
Author
re: More than a third of Android apps host malware
Nicholas.Lee   8/4/2012 3:59:58 PM
NO RATINGS
Now that they have used the dubious excuse of 9:11 to put GPS tracking of every citizen into your phones, they now want to use the dubious excuse of malware and other scare tactics to make everyone have privacy-invading DPI chips in every phone. If they do much more to "protect us" then we will be so repressed and have so few rights that we won't have a life worth protecting. All we need is good, strong, open-source encryption. If mobile software has vulnerabilities then it should be open-sourced so the community can fix it.

Neo10
User Rank
Author
re: More than a third of Android apps host malware
Neo10   8/2/2012 7:22:00 AM
NO RATINGS
Or as pointed out we should start by defining that end to end encryption is mandatory for every service which needs user info. This should by default be built into the application itself.

Sparky_Watt
User Rank
Author
re: More than a third of Android apps host malware
Sparky_Watt   8/1/2012 10:40:08 PM
NO RATINGS
I recently saw an article on Android Anti-Virus Software. It pointed out that EVERYTHING in an Android is sandboxed. Therefore an Anti-Virus program can't see the programs it is trying to detect, by definition. Malware can't see your information, unless you say it can. What is crazy to me is that there are so many apps out there that require every permission in the book. On the one hand, that should set anyone's suspicions off. On the other hand, users shouldn't be required to look at a laundry list of permissions to decide whether a specific app should have them. Most are unable, and many have both legitimate and illegitimate uses. So, a program that uses it legitimately could use it illegitimately as well. The best answer, I am sorry to say, is to take all those permissions away. I can be identified by my GPS location alone (I spend time at home, right?) any app that can see both my GPS and the Internet could be a stalking tool. The only solution is for the apps to be code inspected by a third party certification agency. Then the distribution package gets compiled by the App Store from the inspected code. The developer pays for this and doesn't know who the inspector is, of course. It may sound extreme, but it is the only solution that will allow full flexibility in the apps and block the potential abuses.

t.alex
User Rank
Author
re: More than a third of Android apps host malware
t.alex   8/1/2012 6:27:01 PM
NO RATINGS
Every app submitted will be evaluated by some app reviewer. This is done against a long checklists, so if your app just shows some information with some random button it will definitely rejected. In terms of privacy, if the app access user location, the system will pop up notification to ask for permission. So the user is making a conscious choice whether to allow or not.

I_B_GREEN
User Rank
Author
re: More than a third of Android apps host malware
I_B_GREEN   8/1/2012 5:35:50 PM
NO RATINGS
The hooks need to be bullet proof and encripted so that they cannot be used in anyway but the end aggrigator

I_B_GREEN
User Rank
Author
re: More than a third of Android apps host malware
I_B_GREEN   8/1/2012 5:34:35 PM
NO RATINGS
But all this is hidden from the average user. People reading this should be a few notches up the fodd chain of software/hardware, but even we have difficulty understanding all this.How is your grandma supposed to figure it out?

I_B_GREEN
User Rank
Author
re: More than a third of Android apps host malware
I_B_GREEN   8/1/2012 5:31:55 PM
NO RATINGS
A hook is a hook is a hook

jluster
User Rank
Author
re: More than a third of Android apps host malware
jluster   8/1/2012 4:14:32 PM
NO RATINGS
It is irresponsible because it creates a scare where there should be education. Nothing Mrs. Knesek mentioned is actually "malware". The definition of malware is "software that does bad things". Not "software that does as it is told". Heck, BT themselves backpedaled on her comments. And if you think the FBI is credible on those things then ask yourself why they, themselves, are so widely hacked and "owned". BT HAS a financial interest in people being scared because THEY sell security practices.

Page 1 / 5   >   >>


Most Recent Comments
Susan Rambo
 
MFahmy0
 
cd2012
 
junko.yoshida
 
MikeD95101
 
betajet
 
junko.yoshida
 
Bill_Higdon
 
Tom_C
Radio
LATEST ARCHIVED BROADCAST
Overview: Battle-hardened veterans of the electronics industry have heard of the “connected car” so often that they assume it’s a done deal. But do we really know what it takes to get a car connected and what its future entails? Join EE Times editor Junko Yoshida as she moderates a panel of movers and shakers in the connected car business. Executives from Cisco, Siemens and NXP will share ideas, plans and hopes for connected cars and their future. After the first 30 minutes of the radio show, our listeners will have the opportunity to ask questions via live online chat.
Flash Poll
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
Special Video Section
LED lighting is an important feature in today’s and future ...
Active balancing of series connected battery stacks exists ...
After a four-year absence, Infineon returns to Mobile World ...
A laptop’s 65-watt adapter can be made 6 times smaller and ...
An industry network should have device and data security at ...
The LTC2975 is a four-channel PMBus Power System Manager ...
In this video, a new high speed CMOS output comparator ...
The LT8640 is a 42V, 5A synchronous step-down regulator ...
The LTC2000 high-speed DAC has low noise and excellent ...
How do you protect the load and ensure output continues to ...
General-purpose DACs have applications in instrumentation, ...
Linear Technology demonstrates its latest measurement ...
10:29
Demos from Maxim Integrated at Electronica 2014 show ...
Bosch CEO Stefan Finkbeiner shows off latest combo and ...
STMicroelectronics demoed this simple gesture control ...
Keysight shows you what signals lurk in real-time at 510MHz ...
TE Connectivity's clear-plastic, full-size model car shows ...
Why culture makes Linear Tech a winner.
Recently formed Architects of Modern Power consortium ...
Specially modified Corvette C7 Stingray responds to ex Indy ...