Do you know which smartphone apps are tracking your location? You really should

referring to In the location services settings on my iPhone, which is in the Privacy settings, I have three choices for granting permission to my location data. I can choose to let an app always know my location, only access my location when the app is in use or never know my location. In the location services settings, you'll see a list of all the apps you have installed that can use your location data. When you load and launch an app for the first time, it will ask for your permission to access your location. Therefore, it's a good idea to periodically check your location services list to make sure you realize how each app is using your location.


From Lyft to Spotify: 12 essential apps you should download to your smartphone now

Talking Tech pick: OutlookMore: Based on African principles, Kwanzaa holiday holds lessons for entrepreneursMore: Bad review? Talking Tech pick: Lyft. Talking Tech pick: Spotify. Talking Tech pick: Google. Talking Tech pick: DashlaneFood deliveryUber Eats, DoorDash and Postmates can bring lunch to you while you're at work.

From Lyft to Spotify: 12 essential apps you should download to your smartphone now

These malicious Android apps will only strike when you move your smartphone

as informed in Malicious Android apps have been uncovered in the Google Play store which will only trigger when a smartphone moves, researchers say. The malicious apps deploy a banking Trojan called Anubis, but it is how the payload deploys which is of real interest. If sensors do generate motion data then the malicious apps will spring and attempt to trick the user into downloading and installing the Anubis Trojan by way of an APK and fake system update message. The code is "strikingly similar" to known Anubis samples and connects to a command-and-control (C2) server hosted on domains also linked to the banking Trojan. A malicious app called "Google Protect," alongside fake shopping and stock market apps masked the Anubis malware deployed for the same goal -- to steal banking credentials.





collected by :John Smith

0/Post a Comment/Comments