This is a warning that we not only access App stores from our phones, but smart TVs, smart speakers, voice assistants, games consoles, computers and other devices all have app stores we use. Application Stores – NCSC.GOV.UK If there are any weaknesses in these various app stores, then you can …
Cisco’s Webex app could leak audio data
Napier University’s Cyber Security department used Webex when I was studying there. Here is research that demonstrates that the software could leak audio even when muted. “Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps,” The research looked at many of the apps that have …
Will this be a more strict Google Play store?
Apple has always promoted it’s App Store as a safe a secure place to download apps to your iOS device because of the level of curation (and fees) they apply to any app available there. Google on the other hand, still charges the fees to developers, but there was always …
Continue reading “Will this be a more strict Google Play store?”
Android apps found with hidden malicious functions
The ability to sideload apps on an Android device, bypassing any curation in the Google Play Store and the apparent regularity that that app store misses malicious content in Android apps, is an constant cyber security issue for anyone using Android. Here are two recent examples: Android apps with 45 …
Continue reading “Android apps found with hidden malicious functions”
Mobile phone malware – a researcher’s point of view and in the wild
Here is some timely advice from TechRepublic about mobile device cyber security: Mobile malware is on the rise: Know how to protect yourself from a virus or stolen data | TechRepublic The big takeaway is sideloading of apps, that have not been approved by an approved app store or repository, …
Continue reading “Mobile phone malware – a researcher’s point of view and in the wild”