Design Con 2015
Breaking News
Comments
Newest First | Oldest First | Threaded View
Page 1 / 5   >   >>
MaxMindor
User Rank
Rookie
solution
MaxMindor   8/7/2014 10:42:56 AM
NO RATINGS
There are a lot of vulnerabilities in mobile systems and it is very important to keep in mind that anyone can create an application and upload it on Google Store. That`s why having a good antivirus like http://www.trendmicro.com/us/home/products/mobile-solutions/android-security/index.html on your smartphone can prevent it from accessing personal data.

Saon Islam
User Rank
Rookie
re: More than a third of Android apps host malware
Saon Islam   8/29/2012 6:56:06 AM
NO RATINGS
Android users beware, more than 50 mobile apps in the official Android Market have been discovered containing malware that could have compromised sensitive and personal data. While Google has already yanked the apps from the Market, this first big infection highlights the inherent vulnerability of Android's openness to developers. Check here for more info http://drawsomethingcheat.eu

Nicholas.Lee
User Rank
Rookie
re: More than a third of Android apps host malware
Nicholas.Lee   8/4/2012 3:59:58 PM
NO RATINGS
Now that they have used the dubious excuse of 9:11 to put GPS tracking of every citizen into your phones, they now want to use the dubious excuse of malware and other scare tactics to make everyone have privacy-invading DPI chips in every phone. If they do much more to "protect us" then we will be so repressed and have so few rights that we won't have a life worth protecting. All we need is good, strong, open-source encryption. If mobile software has vulnerabilities then it should be open-sourced so the community can fix it.

Neo10
User Rank
Rookie
re: More than a third of Android apps host malware
Neo10   8/2/2012 7:22:00 AM
NO RATINGS
Or as pointed out we should start by defining that end to end encryption is mandatory for every service which needs user info. This should by default be built into the application itself.

Sparky_Watt
User Rank
Rookie
re: More than a third of Android apps host malware
Sparky_Watt   8/1/2012 10:40:08 PM
NO RATINGS
I recently saw an article on Android Anti-Virus Software. It pointed out that EVERYTHING in an Android is sandboxed. Therefore an Anti-Virus program can't see the programs it is trying to detect, by definition. Malware can't see your information, unless you say it can. What is crazy to me is that there are so many apps out there that require every permission in the book. On the one hand, that should set anyone's suspicions off. On the other hand, users shouldn't be required to look at a laundry list of permissions to decide whether a specific app should have them. Most are unable, and many have both legitimate and illegitimate uses. So, a program that uses it legitimately could use it illegitimately as well. The best answer, I am sorry to say, is to take all those permissions away. I can be identified by my GPS location alone (I spend time at home, right?) any app that can see both my GPS and the Internet could be a stalking tool. The only solution is for the apps to be code inspected by a third party certification agency. Then the distribution package gets compiled by the App Store from the inspected code. The developer pays for this and doesn't know who the inspector is, of course. It may sound extreme, but it is the only solution that will allow full flexibility in the apps and block the potential abuses.

t.alex
User Rank
Rookie
re: More than a third of Android apps host malware
t.alex   8/1/2012 6:27:01 PM
NO RATINGS
Every app submitted will be evaluated by some app reviewer. This is done against a long checklists, so if your app just shows some information with some random button it will definitely rejected. In terms of privacy, if the app access user location, the system will pop up notification to ask for permission. So the user is making a conscious choice whether to allow or not.

I_B_GREEN
User Rank
Rookie
re: More than a third of Android apps host malware
I_B_GREEN   8/1/2012 5:35:50 PM
NO RATINGS
The hooks need to be bullet proof and encripted so that they cannot be used in anyway but the end aggrigator

I_B_GREEN
User Rank
Rookie
re: More than a third of Android apps host malware
I_B_GREEN   8/1/2012 5:34:35 PM
NO RATINGS
But all this is hidden from the average user. People reading this should be a few notches up the fodd chain of software/hardware, but even we have difficulty understanding all this.How is your grandma supposed to figure it out?

I_B_GREEN
User Rank
Rookie
re: More than a third of Android apps host malware
I_B_GREEN   8/1/2012 5:31:55 PM
NO RATINGS
A hook is a hook is a hook

jluster
User Rank
Rookie
re: More than a third of Android apps host malware
jluster   8/1/2012 4:14:32 PM
NO RATINGS
It is irresponsible because it creates a scare where there should be education. Nothing Mrs. Knesek mentioned is actually "malware". The definition of malware is "software that does bad things". Not "software that does as it is told". Heck, BT themselves backpedaled on her comments. And if you think the FBI is credible on those things then ask yourself why they, themselves, are so widely hacked and "owned". BT HAS a financial interest in people being scared because THEY sell security practices.

Page 1 / 5   >   >>


Top Comments of the Week
Flash Poll
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
<b><a href=Betajet">

The Circle – The Future's Imperfect in the Present Tense
Betajet
Post a comment
The Circle, a satirical, dystopian novel published in 2013 by San Francisco-based writer Dave Eggers, is about a large, very powerful technology company that combines aspects of Google, ...

Max Maxfield

Recommended Reads From the Engineer's Bookshelf
Max Maxfield
2 comments
I'm not sure if I read more than most folks or not, but I do I know that I spend quite a lot of time reading. I hate to be idle, so I always have a book or two somewhere about my person -- ...

Martin Rowe

No 2014 Punkin Chunkin, What Will You Do?
Martin Rowe
2 comments
American Thanksgiving is next week, and while some people watch (American) football all day, the real competition on TV has become Punkin Chunkin. But there will be no Punkin Chunkin on TV ...

Rich Quinnell

Making the Grade in Industrial Design
Rich Quinnell
15 comments
As every developer knows, there are the paper specifications for a product design, and then there are the real requirements. The paper specs are dry, bland, and rigidly numeric, making ...

Special Video Section
The LT8640 is a 42V, 5A synchronous step-down regulator ...
The LTC2000 high-speed DAC has low noise and excellent ...
How do you protect the load and ensure output continues to ...
General-purpose DACs have applications in instrumentation, ...
Linear Technology demonstrates its latest measurement ...
10:29
Demos from Maxim Integrated at Electronica 2014 show ...
Bosch CEO Stefan Finkbeiner shows off latest combo and ...
STMicroelectronics demoed this simple gesture control ...
Keysight shows you what signals lurk in real-time at 510MHz ...
TE Connectivity's clear-plastic, full-size model car shows ...
Why culture makes Linear Tech a winner.
Recently formed Architects of Modern Power consortium ...
Specially modified Corvette C7 Stingray responds to ex Indy ...
Avago’s ACPL-K30T is the first solid-state driver qualified ...
NXP launches its line of multi-gate, multifunction, ...
Doug Bailey, VP of marketing at Power Integrations, gives a ...
See how to ease software bring-up with DesignWare IP ...
DesignWare IP Prototyping Kits enable fast software ...
This video explores the LT3086, a new member of our LDO+ ...
In today’s modern electronic systems, the need for power ...