This is another story of another malicious Android app making its way into the Googler Play store and then onto users devices: Anatsa Android malware downloaded 150,000 times via Google Play (bleepingcomputer.com) Something Apple users can probably look forward to when the EU forces Apple to allow side loading and …
I really like the Apple App Store
Let me clarify that statement. I really like the Apple App Store as a step in a cyber security plan. When your people have your organisation’s infomration on their devices – it is reassuring that those who are using Apple devices are getting their apps from a sorce that is …
Apple’s report into how it stops App Store crimes
I choose not to call them scams but crimes. The Apple App Store is well curated, that is one of Apple’s selling points for its products – the added security this curation brings. But of course, the threat actors are always looking for ways to squeeze past this curation. Apple …
Continue reading “Apple’s report into how it stops App Store crimes”
You must have an Android cyber security policy
People complain about the way Apple controls its App store, “Android and Google Apps are far less restrictive”, but whatever the arguments it does mean their level of app curation improves the cyber security of Apple devices. The fact that Apple controls both the hardware and operating systems of their …
Continue reading “You must have an Android cyber security policy”
Watch where you download your Tor browser from…
…or any other software. Governments around the world, including for instance Russia, ban Tor web sites from the internet in their countries as it is a very effective way for users to conceal their IP address from authorities. However this had led to a rise in other sites offering Tor …
Continue reading “Watch where you download your Tor browser from…”
When does an app need access to your all your contacts?
Whenever I install an app and it asks for access to my contact list, it always sets off alarm bells for me. If I cannot see a valid reason for access, I will definitely deny the request and often will just delete the app. My contacts are mine and the …
Continue reading “When does an app need access to your all your contacts?”
NCSC warns of risks with App stores
This is a warning that we not only access App stores from our phones, but smart TVs, smart speakers, voice assistants, games consoles, computers and other devices all have app stores we use. Application Stores – NCSC.GOV.UK If there are any weaknesses in these various app stores, then you can …