Browsing Category: Mobile Security

Categories: Mobile Security

Google’s Android platform has become the most popular mobile operating system both among consumers and malware writers, and the company earlier this year introduced the Bouncer system to look for malicious apps in the Google Play market. Bouncer, which checks for malicious apps and known malware, is a good first step, but as new work from researchers Jon Oberheide and Charlie Miller shows, it can be bypassed quite easily and in ways that will be difficult for Google to address in the long term.

Read more...

Categories: Mobile Security

Combine the rapid adoption of mobile devices with the behavior of some companies developing applications for them, and what do you get? A pocket-sized, portable privacy liability. Veracode explores the consequences of rampant data-mining and the importance of finding the balance between function and privacy in this infographic published today.

Read more...

Categories: Apple, Mobile Security

Apple has released a detailed security guide for its iOS operating system, an unprecedented move for a company known for not discussing the technical details of its products, let alone the security architecture. The document lays out the system architecture, data protection capabilities and network security features in iOS, most of which had been known before but hadn’t been publicly discussed by Apple.

Read more...