Maksym Yemelyanov - Fotolia

Download: Sleeping Android - dangers of dormant permissions

A weakness in the permissions architecture of the Android platform means apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers. Should you be worried?

A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers.

Download now to uncover the basics of the permission architecture, enabling you to understand the evolution and second guess its progression. The bigger the company and the more employees, the higher the stakes, learn how you can expose a weakness. 

Member benefits:

• Instant access to our library of premium content
• Each week's issue direct to your inbox, free
• Uninterrupted readership of guides and features
• Invites to our exclusive events
• And much more

Read more on Tablet computers

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close