8/11/2016 1:02:46 PM
Enterprise Mobile Threat Update for Q3 2016 Arrives
Mobile Threat,Enterprise Mobile,Appthority
App Developer Magazine

Enterprise Mobile Threat Update for Q3 2016 Arrives

Richard Harris Richard Harris in Android Thursday, August 11, 2016

Appthority has released it Enterprise Mobile Threat Update for Q3 2016, which provides insight into the mobile threat landscape over the last quarter.

Appthority’s Enterprise Mobile Threat Team monitors and researches the latest mobile risks that are direct threats to the enterprise. The data is compiled into the quarterly Enterprise Mobile Threat Update, aimed at providing in-depth analysis of the top enterprise mobile threats for IT mobility & security teams. 

In the Q3 Update, Appthority reviews two major vulnerability types surfacing in Android apps - autorooting and overlay malware, offers analysis on whether Apple’s faster app review times have coincided with vulnerabilities the Apple App Store starting experiencing last summer, and assesses the new Android permissions model to see if apps are getting safer with its more granular runtime permissions.

Key highlights from the report include:

- Godless, LevelDropper, and Overlay have recently surfaced in the Google Play Store, all in the month June. These types of mobile vulnerabilities can have adverse effects on the enterprise, including decreased employee productivity and weakened data security.

- Faster Apple app review times have not been accompanied by enhanced security vetting. Apps with malware and security vulnerabilities continue to surface in the Apple App Store as well as the Google Play Store.

- In apps tracked in Appthority’s enterprise database, nearly half of the 24 permissions labeled “dangerous” saw a net reduction with Android’s new permission model. Thus, the new permission model is progress for app security, there is more that can be done to help users protect their privacy and their data. Appthority suggests taking additional steps such as requiring developers to always state why a certain permission is being requested, including an explanation of how the app would make use of the information, and further increasing the granularity of permissions to narrow the sensitive data being accessed by each permission.

Read more: https://www.appthority.com/

Get your Pi Day 2019 Shirt

Love Is Like Pi Never Ending T-Shirt Math Pi day Gift Shirt. Perfect Shirt to celebrate Pi Day 2019. Great gift whether you just love Math or you are a Math Student, Teacher or similar.

475 Tax Deductions for Businesses and Self-Employed Individuals

Are you paying more taxes than you have to as a developer or freelancer? The IRS is certainly not going to tell you about a deduction you failed to take, and your accountant is not likely to take the time to ask you about every deduction you’re entitled to. As former IRS Commissioner Mark Everson admitted, “If you don’t claim it, you don’t get it.

A hands-on guide to mastering mobile forensics for iOS and Android

Get hands-on experience in performing simple to complex mobile forensics techniques Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums A practical guide to leveraging the power of mobile forensics on popular mobile platforms with lots of tips, tricks, and caveats.

Gps tracker for kids

The Chirp GPS app is a top-ranked location sharing app available for Apple and Android that is super easy to use, and most of all, it's reliable.

The Latest Nerd Ranch Guide (3rd Edition) to Android Programming

Write and run code every step of the way, using Android Studio to create apps that integrate with other apps, download and display pictures from the web, play sounds, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development.