It has become an inevitable part of the Android user experience that apps will ask for a long laundry list of permissions. Many apps will ask you to grant them network access so they can download updates. Others seek permission to read your phone’s state and identity so calls won’t disrupt them from doing what…
Read MoreAlice Decker
Senior Threat Researcher
Living in Europe, I noticed the general interest of the media, politicians, and users about privacy and potential data leakage. This concern is surely not limited to Europeans — people from around the globe and governments are also interested on how to protect the sensitive data stored on mobile devices. With this in mind, I…
Read MoreEarlier this month, the Anti-Malware Testing Standards Organization (AMTSO) published new guidelines on the delicate topic of testing anti-malware products. Since then, many experts in the anti-malware industry have been commenting on the said guidelines. Many of these comments (including some from myself), have been summed up by tech blogger Kevin Townsend here. After reading…
Read MoreSome time ago (February 25–26), the Anti-Malware Testing Standard Organization (AMTSO) had its first meeting this year. This time, it was hosted by McAfee and took place in Santa Clara, California. One of the hot topics during the meeting was related to the initiative to review reports published by testing and certification organizations/companies. How was…
Read MoreDefCon in Las Vegas is probably the biggest event hackers and even non hackers have been waiting for. Although there were fewer people in this year’s DefCon (around 6,000, my estimate), the presentations, contests, and parties still raked in a huge number of attendees. The DefCon attendees believe that cybercriminals will likely be doing more…
Read More