

Christoph Hebeisen
Director, Security Intelligence Research /*=$expert->feature_status*/ ?>
Lookout
Comments Dotted :
7
December 02, 2020
This app could expose both the user and possibly their employer to significant legal risk.
The Ipsos Iris Blue app permits the operator to access all network communications of the device it is running on including content protected SSL/TLS encryption (with the exception of traffic used by apps using correctly implemented certificate pinning). In addition, the app can access all content displayed on the device screen. A user might decide for themselves that they are willing to grant a third party this level of insight though it is doubtful that many would if they fully understood all.....Read More

November 18, 2020
The sale of individual, personalized data collected as a side effect by mobile apps is highly problematic from a privacy perspective.
The sale of individual, personalized data collected as a side effect by mobile apps is highly problematic from a privacy perspective. While location data is necessary to determine local prayer times and directions, transmitting and storing that data in a cloud service - let alone the sale to third parties - is not necessary to provide the service and something users of the app will not reasonably expect.

October 21, 2020
Routing calls to third-party carriers is an important feature to enable roaming of mobile devices.
SMS's susceptibility to attacks is well understood and it should therefore not be considered a secure method for two-factor authentication. This is especially the case when dealing with sophisticated or well-funded attackers that may infiltrate or control carrier networks. Routing calls to third-party carriers is an important feature to enable roaming of mobile devices. However, since no secure verification takes place between the device and its home carrier to verify that it has signed on to .....Read More

July 29, 2020
The use of sophisticated mobile surveillanceware for domestic spying purposes appears more widespread than previously known.
The use of sophisticated mobile surveillanceware for domestic spying purposes appears more widespread than previously known, including in western democracies. In light of widespread election meddling and spying on political parties and movements all over the world it is clear that protecting information and communication infrastructure including mobile devices is quickly becoming critical to any organisation with a need for confidentiality.

July 09, 2020
The removal of the TikTok app from both Google Play and the Apple App Store in India has created a similar situation.
When legitimate, popular channels to acquire a popular app are blocked for whatever reason, it presents an opportunity for malicious actors to lure victims by promising a way around the restriction. We have seen similar attempts to entice users to install malware in connection with the distribution of Fortnite for Android outside of Google Play as well as the geographically staggered release of PokemonGo. The removal of the TikTok app from both Google Play and the Apple App Store in India has.....Read More

May 28, 2020
Users should ensure they always apply the most recent updates to their devices.
Android devices usually arrive preloaded with a number of apps (and sometimes other customisations) added by the manufacturer and, often, the carrier too. Like all apps, these can suffer from vulnerabilities and thereby expose the user to security and privacy risks. What makes these apps special is that the user may not be able to remove them, and, in some cases, they have additional privileges not available to user-installed apps.
While geographic customisation may be necessary in some.....Read More

April 23, 2020
Surveillance tooling using such exploits is available for sale and, in some cases, as a service by third parties.
As we have seen in the past, sophisticated attacks on high value - or high profile - targets aim to leverage exploit chains starting with a one-click or zero-click attack to increase their chances of success. Surveillance tooling using such exploits is available for sale and, in some cases, as a service by third parties. The rising prevalence of such attacks indicates that attackers are becoming increasingly aware that mobile devices are the most valuable targets for surveillance and spying......Read More
