Black Hat: 'App Genome' Exposes Smartphone Risks - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Cloud // Cloud Storage
News
7/28/2010
03:41 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Black Hat: 'App Genome' Exposes Smartphone Risks

Researchers from Lookout will present their findings thus far in study of freebie Android, iPhone apps.

Android smartphone applications typically don't have as much access to private information, such as location and contact lists, as many iPhone apps do, but they're more likely to contain potentially dangerous third-party code, according to a sneak peek at new research that will be revealed at Black Hat USA this week.

Researchers from Lookout, a smartphone security company, are releasing new data from their so-called "App Genome Project," which scans and maps smartphone apps to pinpoint threats and privacy risks. The project has mapped the behavior of 100,000 smartphone apps and has scanned about 300,000 so far.

Among the preliminary findings: Thirty-three percent of free iPhone apps have the ability to see the smartphone user's physical location, while 29 percent of free Android apps can do the same. And 14 percent of free iPhone apps can access a user's contact list, while 8 percent of free Android apps can do so.

To learn more, click here to see the complete story on Darkreading.com.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
Slideshows
Flash Poll