who defends your mobile robot or humans
Last Updated : GMT 09:40:38
Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle
Last Updated : GMT 09:40:38
Themuslimchronicle, themuslimchronicle

Who defends your mobile: robot or humans?

Themuslimchronicle, themuslimchronicle

Themuslimchronicle, themuslimchronicleWho defends your mobile: robot or humans?

California - Arabstoday

At the start of this month, Google sent a message to Android malware authors: No more Mr. Nice Guy. In a blog post, engineering vice president Hiroshi Lockheimer wrote that Google had been scanning Android Market apps \"for a while now\" with an automated routine called Bouncer. Lockheimer\'s post explained that Bouncer inspects apps for known malware and troubling behavior, in part by running them on simulated Android phones. It works, he said: \"Between the first and second halves of 2011, we saw a 40 percent decrease in the number of potentially malicious downloads from Android Market.\" ANALYSIS: Chomp: An Easy Way to Search for Apps Since the prior defense on the Market had consisted of Google yanking rogue apps after users reported them, this was a major advance. But is it enough? On one level, you could say so. Symantec\'s database of threats only lists one recent case of Market malware (separate from apps hosted elsewhere, which you can\'t install on Android by default), an app that Lookout Mobile Security and others ruled was merely a pushy advertising operation. The latest report of Market malware from another security firm, Sophos, was a December warning about malicious games. Lookout representative Remi Harrad wrote Friday that \"we haven’t found any more significant malware on the Android Market\" since early February. But Chester Wisniewski, senior security advisor at Sophos, wrote that the major problem on the Market was \"dodgy apps\" that steal personal data -- and that Bouncer hadn\'t helped. Past studies of automated scrutiny of mobile apps suggest caution. A 2011 report (PDF) by researchers at the University of California at Berkeley found that the automated screening of Nokia\'s Ovi software store had apparently okayed five of 24 malicious apps. A 2008 paper (PDF) by IBM, Samsung and University of Michigan researchers suggested that well-crafted \"behavioral detection\" could identify malware \"with more than 96 percent accuracy\" -- not good enough to surrender judgment to the likes of Bouncer. Two security professionals suggested possible gaps in Google\'s scrutiny. Peter Szor, a researcher who joined McAfee Labs last spring, said some Android malware is \"very device specific\" -- targeting particular models -- and so might look safe in virtual-machine testing. He also noted that rogue applications could download malicious code after being installed. Chris Ensey, director of government relations for SafeNet, Inc., echoed that concern. He added that while security firms like his employ \"virtual execution\" techniques to check attachments and links sent to employees, that\'s easier work: Those items shouldn\'t run any code. Flagging a malicious application \"requires far more advanced inspection tactics.\" BLOG: Undress Catalog Models with New App Meanwhile, you can and should consult the useful data Google provides about Market apps (including recent additions like \"+1\" recommendations for apps from Google Plus users) before downloading them. Don\'t install anything from outside the Market unless you know exactly what you\'re doing -- the latest attack Sophos reported was a download from a site listed on a Facebook profile Lookout representative Remi Harrad wrote Friday that \"we haven’t found any more significant malware on the Android Market\" since early February. But Chester Wisniewski, senior security advisor at Sophos, wrote that the major problem on the Market was \"dodgy apps\" that steal personal data -- and that Bouncer hadn\'t helped. Past studies of automated scrutiny of mobile apps suggest caution. A 2011 report (PDF) by researchers at the University of California at Berkeley found that the automated screening of Nokia\'s Ovi software store had apparently okayed five of 24 malicious apps. A 2008 paper (PDF) by IBM, Samsung and University of Michigan researchers suggested that well-crafted \"behavioral detection\" could identify malware \"with more than 96 percent accuracy\" -- not good enough to surrender judgment to the likes of Bouncer. Two security professionals suggested possible gaps in Google\'s scrutiny. Peter Szor, a researcher who joined McAfee Labs last spring, said some Android malware is \"very device specific\" -- targeting particular models -- and so might look safe in virtual-machine testing. He also noted that rogue applications could download malicious code after being installed. Chris Ensey, director of government relations for SafeNet, Inc., echoed that concern. He added that while security firms like his employ \"virtual execution\" techniques to check attachments and links sent to employees, that\'s easier work: Those items shouldn\'t run any code. Flagging a malicious application \"requires far more advanced inspection tactics.\" BLOG: Undress Catalog Models with New App Meanwhile, you can and should consult the useful data Google provides about Market apps (including recent additions like \"+1\" recommendations for apps from Google Plus users) before downloading them. Don\'t install anything from outside the Market unless you know exactly what you\'re doing -- the latest attack Sophos reported was a download from a site listed on a Facebook profile

themuslimchronicle
themuslimchronicle

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

who defends your mobile robot or humans who defends your mobile robot or humans

 



Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle

GMT 06:35 2017 Thursday ,31 August

Eid al-Adha holiday for federal government announced

GMT 10:59 2012 Wednesday ,16 May

National list of endangered species soon

GMT 09:06 2018 Tuesday ,23 January

US warns Russia on Syria chemical attack report

GMT 03:22 2017 Thursday ,02 March

Pakistan hosts 10-nation regional economic summit

GMT 08:50 2018 Sunday ,07 January

India's Pandya defies South African bowlers

GMT 00:21 2017 Wednesday ,11 January

Iran to start gas exports to Iraq once payments made

GMT 17:57 2017 Tuesday ,05 December

Assistant Foreign Minister attends GCC meeting

GMT 14:23 2017 Monday ,04 September

Colombia government, ELN rebels agree ceasefire

GMT 05:31 2015 Sunday ,05 April

Williams romps to eighth Miami crown

GMT 09:54 2017 Tuesday ,07 March

Lee and Lin face emotional farewells

GMT 12:30 2017 Monday ,27 November

Trudeau urges international community

GMT 09:06 2017 Wednesday ,19 April

Trump — from Syria to North Korea
Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle
 
 Themuslimchronicle Facebook,themuslimchronicle facebook  Themuslimchronicle Twitter,themuslimchronicle twitter Themuslimchronicle Rss,themuslimchronicle rss  Themuslimchronicle Youtube,themuslimchronicle youtube  Themuslimchronicle Youtube,themuslimchronicle youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2023 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2023 ©

muslimchronicle muslimchronicle muslimchronicle muslimchronicle
themuslimchronicle themuslimchronicle themuslimchronicle
themuslimchronicle
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
themuslimchronicle, themuslimchronicle, themuslimchronicle