----------------------------------------------------------------------
Message-ID: <FAD5474D-A6B1-4308-A1EE-2877207EAC19@roscom.com>
Date: Fri, 5 May 2017 20:14:54 -0400
From: Monty Solomon <monty@roscom.com>
Subject: How to Protect Your Privacy as More Apps Harvest Your Data
How to Protect Your Privacy as More Apps Harvest Your Data
Most free online services will probably cost you some personal information,
but a few simple tips can help stem the tide.
In the real world, your personal life is a private space. But in tech,
your personal data is a ripe resource for businesses to harvest in
their own interests.
That was the broad takeaway from last week's New York Times profile on
Uber, the car-summoning service, and its chief executive, Travis
Kalanick. Among other revelations, the report illuminated that to stay
competitive, Uber bought information about its main American
ride-hailing competitor, Lyft, from Unroll.me, a free email digest
service.
https://www.nytimes.com/2017/05/03/technology/personaltech/how-to-protect-your-privacy-as-more-apps-harvest-your-data.html
------------------------------
Message-ID: <DB484AC6-CC17-4B7F-BC4C-7D78691668FF@roscom.com>
Date: Tue, 2 May 2017 22:16:32 -0400
From: Monty Solomon <monty@roscom.com>
Subject: Hundreds of Android apps are prime targets for hacking
Hundreds of popular Android apps have open ports, making them prime
targets for hacking
A recent study found 956 potential exploits in Android apps that could
allow data extraction, malware installs, and remote device control.
Some of the affected apps have tens of millions of installs.
By Brandon Vigliarolo
A University of Michigan study found 410 Android apps in the Google
Play store with open ports. Those 410 apps can be exploited in 956
different ways. While that may not seem like a lot of affected
software, the downloads speak otherwise: Several are popular apps with
between 10 and 50 million downloads. One even comes pre-installed on
several devices.
Security professionals are no stranger to open ports, and both their
legitimate and nefarious uses. Opening ports allows software to reach
beyond the corporate firewall, and vice-versa, but also leaves
exploitable gaps in security. Those with malicious intent and the
proper skills can use open ports to wreak havoc on a network.
http://www.techrepublic.com/article/hundreds-of-popular-android-apps-have-open-ports-making-them-prime-targets-for-hacking/
------------------------------
*********************************************
End of telecom Digest Sun, 07 May 2017