Sponsored by ComputerWeekly.com
A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers. Changes to the way the Android platform authorises permission requests could compromise the security of unwary users. Access >>>
Table of contents
- Permission architecture basics
- Permission architecture evolution
- When evolution exposes weakness
Premium Content for Free.
More Premium Content Accessible For Free
A guide to storage and virtualisation
Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key ...
Agile Foundations – the Agile Manifesto
In this extract from their book, Agile Foundations, Peter Measey and Radtac explain the key principles of the Agile Manifesto.
Big Data BlackOut: Are Utilities Powering Up Their Data Analytics?
This report from Capgemini Consulting identifies a disparity between the utilities industry's perception of big data analytics and its implementation...