Android 11 — 5 New Security and Privacy Features You Need to Know

Android 11 will come with one-time permissions, permission auto-reset for unused apps, quicker security patches, scoped storage enforcement, and restrictions on background location access.

Apple's Attest API tool aims to tighten app security

If an app is trying to exceed its authorized permissions, it’s challenging for forensic researchers to examine the behavior. This API aims to reduce the likelihood of apps behaving in a malicious way.

TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic

App concealed the practice of gathering device unique identifiers using an added layer of encryption.

US firm accused of secretly installing location tracking SDK in mobile apps

Reportedly, a US government contractor ‘Anomaly Six’ has location tracking software hidden in more than 500 mobile apps.

iOS 14 update will tell you if your password is too easy to guess

The latest iteration of Apple's mobile software will include an upgraded system to ensure passwords stay protected, as well as a load of new suggestions and tools to help stop leaks.

TikTok To Stop Clipboard Snooping After Apple Privacy Feature Exposes Behavior

A new privacy feature in Apple iOS 14 sheds light on TikTok’s practice of reading iPhone users’ cut-and-paste data, even though the company said in March it would stop.

Most COVID-19 contact-tracing apps are not adequately secured

Guardsquare researchers unpacked and decompiled 17 Android contact-tracing apps from 17 countries to see whether developers implement name obfuscation, string, asset/resource, and class encryption.

Coronavirus Tracing App a Test for Privacy-Minded Germany

Germany launched a coronavirus tracing app Tuesday that officials say is so secure even government ministers can use it.

Hackers release a new jailbreak that unlocks every iPhone

A renowned iPhone hacking team has released a new “jailbreak” tool that unlocks every iPhone, even the most recent models running the latest iOS 13.5.

Attacks via Bluetooth possible on iPhone 8 and older

Some iPhones, iPads, and Macs are vulnerable to short-range attacks via Bluetooth which could fool them into thinking they are connected to a trusted device.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags