permissions

Fri
27
Oct
John Lister's picture

Most Phone Apps Want Unnecessary Device Access

Most popular mobile apps request system permissions that aren't necessary for their stated functions, according to a new study. In some cases, an app requested more unnecessary functions than necessary ones. The figures come from NordVPN, which ... examined the five most popular apps in 18 common categories. They repeated the exercise for both Android and iOS, making a combined total of 103 different apps. (Source: nordvpn.com ) Both mobile operating systems now use a permissions system that means apps must request specific permission for different types of access to a phone's data and components ... (view more)

Wed
01
Dec
John Lister's picture

Android 12 Brings Incredibly Useful Privacy Tools

The latest version of Android adds several new privacy features. However, users may need to make some manual tweaks to take full advantage. The changes come in Android 12 which is rolling out to newer phones at the moment. Older models will either ... get it later on or will never be able to get it, depending on the manufacturer. The biggest change is more information about the permissions system. That's the set-up by which users don't have to give an app complete access to the hardware and software on their system. Instead they can individually grant or restrict individual permissions, each of ... (view more)

Fri
11
Sep
John Lister's picture

Android 11 to Get Significant Security Boosts

Android devices will are getting some key security changes. The tweaks to the permissions system are meant to reduce the need to weigh up security against convenience. The changes will come in Android 11, which begins rolling out to handsets this ... month. Because its an open source system, the new version of the operating system will take longer to get to some brands than others, and older phones and tablets won't ever get it. The main changes are to Android's permission system, which allows users to theoretically control parts of the device's software and hardware an app can access or control ... (view more)

Tue
25
Jun
John Lister's picture

Report: Many Apps on Google Store are Fake, Scams

A report suggests that thousands of apps on the Google Play store are in fact counterfeits made to look like the legitimate app, but instead pose a major security risk to users. The study says such apps ask for dangerous levels of access to the ... phone or are packed with advertising. The study is a joint effort of the University of Sydney and Australia's national science research agency CSIRO. It took two years to carry out and involved trawling through 1.2 million apps to look for potential counterfeits. Rather than have humans check each app uploaded to Google Play (which would be entirely ... (view more)

Tue
01
Jan
John Lister's picture

Apps Share Data With Facebook, Even if No FB Account

20 popular Android apps are sharing user data with Facebook without permission, according to a new report. Privacy International says the data sharing happens even if the user doesn't have a Facebook account. The organization tested 34 apps, each of ... which have been installed at least 10 million times on Android devices. It looked at data that was transmitted through the Facebook Software Development Kit (SDK). The kit is a set of tools that are designed to help app developers coordinate their apps with the Facebook system. This is more commonly associated with retrieving data from ... (view more)

Fri
28
Sep
Dennis Faas's picture

8 Ways to Protect Your Backups from Ransomware

Infopackets Reader Bob S. writes: " Dear Dennis, ... [I run an accounting firm and was recently hit with a ransomware attack which encrypted over 70,000 of my files . I nearly lost everything, though I was finally able to overcome this and recover ... my data through your help] ... What I need is a comprehensive backup solution that will allow me to automate my backups - which means having the backup drive attached to my system 24/7 - yet, the backup drive must be protected such that ransomware cannot spread to the drive and encrypt my backup data. If that were to happen, my backups would be ... (view more)

Thu
05
Jul
John Lister's picture

App Developers Could Be Reading Your Gmail

Google has confirmed that third parties may be able to read your Google email (Gmail) messages. The resulting controversy comes from a lack of clarity over its permission settings. The issue isn't about Google itself reading email messages. ... Previously, Google servers would scan email messages for keywords, then use targeted advertisements based on those keyboards whenever users logged into Gmail to read their emails. However, Google has dropped this policy last year and instead bases its ads on other information, such as Google web searches and YouTube viewing. The latest controversy relates ... (view more)

Mon
29
May
Dennis Faas's picture

How to Fix: Hide User Accounts on Windows 7, 8, 10 Login Screen

Infopackets Reader Sam R. writes: " Dear Dennis, I am running Windows 10 and I have installed RDP Wrapper (per your previous article). This allows more than one person to use the same Windows computer via remote desktop - this is very convenient if ... you have a 'server' computer and want to use it for multiple purposes. I have a question: I would like to be able to hide the remote desktop user accounts I want to use on the server from being displayed on the Windows 10 login screen. Do you know how I can do this? " My response: It is possible to hide user accounts from the Windows 7, 8 and 10 ... (view more)

Thu
16
Mar
John Lister's picture

Twitter, Facebook Users: Review Account Settings

A major "hack" of prominent Twitter accounts has raised awareness of a big security loophole. The problem isn't with Twitter itself, but rather third party tools. This morning several thousand accounts belonging to public figures and major ... organizations and businesses posted identical messages. The tweets included a swastika symbol and references to Nazi views in Germany and the Netherlands and are thought to relate to an ongoing political spat between the Netherlands and Turkey. (Source: bostonglobe.com ) There's never a good time for accounts to be hijacked in such a way, ... (view more)

Mon
02
Jan
Dennis Faas's picture

How to Fix: Operation Requires Interactive Windows Station (Code 28) Error

Infopackets Reader Gord F. writes: " Dear Dennis, I recently installed Windows 10 on my PC. Everything has been working fine for over a year, however, all the sudden my Logitech webcam 300 stopped working with Windows 10. I thought perhaps I may ... need to reinstall the driver, so I went to Device Manager to locate the webcam but it is not there anymore. Instead, I see an 'Unknown device' and if I double click it, it says: 'The drivers for this device are not installed. (Code 28) This operation requires an interactive windows station'. I have absolutely no idea what that means. I tried ... (view more)

Pages

Subscribe to RSS - permissions