Exodus Permissions and Trackers Report for Android Applications

If you need to find out the permissions and trackers that are required or in use by an Android application, visit, https://reports.exodus-privacy.eu.org/en/. Here, you can enter the application URL of any application from any app store and can see the results of the permissions the applications require and the trackers they use. As an example, … Continue reading Exodus Permissions and Trackers Report for Android Applications

Xiaomi or Xperia type security issues and how to detect them on any Android device

Anything that is too good to be true and available at dirt-cheap prices like the Xiaomi phones sold in flash sales on http://www.flipkart.com, always has a catch. It is like the Trojan horse. The security issue with Xiaomi phones is that the phone allegedly transmits user sensitive data like IMEI, contacts, numbers etc to servers … Continue reading Xiaomi or Xperia type security issues and how to detect them on any Android device

Linkedin.com and your personal information

Recently, linkedin.com (http://www.linkedin.com) has introduced a slew of new features. Most features are introduced to enhance your experience with using the site, but there are others that appear very useful, but have some concerns over the information you have that you can control on the linkedin.com site. When you create profiles on social networking sites … Continue reading Linkedin.com and your personal information

RSA Secure ID vulnerability

Like erstwhile forts, security relies upon defense in depth and also upon the security of other infrastructure elements, that a particular service depends on. If the crocodiles in the moat around the fort die, then you have a vulnerability that can compromise the security of the fort. Therefore, this item http://news.cnet.com/8301-1009_3-20044775-83.html?tag=nl.e757 illustrates a key element, … Continue reading RSA Secure ID vulnerability