Sponsored by ComputerWeekly.com
A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers. Changes to the way the Android platform authorises permission requests could compromise the security of unwary users. Access >>>
Table of contents
- Permission architecture basics
- Permission architecture evolution
- When evolution exposes weakness
Premium Content for Free.
More Premium Content Accessible For Free
No more excuses: VDI is ready!
There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualisation expert Brian Madden who directly ...
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel ...
CW Europe - April 2015 Edition
With the datacentre industry a major consumer of non-renewable energy, it continues to come under fire from environmental campaigners and users to ...