Close Menu
  • Home
  • Celebrity Gossip
  • Entertainment News
  • Featured
  • Photo News
  • Advertise with Us
  • About Us
  • Privacy Policy
Facebook X (Twitter) Instagram YouTube WhatsApp
Facebook X (Twitter) Instagram YouTube WhatsApp TikTok
BigEye.UG
Subscribe
  • HOME
  • CELEBRITY GOSSIP
  • ENTERTAINMENT
  • PHOTO NEWS
  • VIDEO NEWS
  • MONEY
    • Money
    • Features
BigEye.UG
Home»Tech and Gadgets»New software developed that catches ‘spying’ apps
Tech and Gadgets

New software developed that catches ‘spying’ apps

BigEyeUg3By BigEyeUg3March 11, 2014
Share
Facebook Twitter Telegram WhatsApp

internet_cafe_shangai_reuters.jpg

Computer scientists have developed a new software that shows whether an app has accessed private data to spy on the user.

Apps on Web-enabled mobile devices can be used to spy on their users, so researchers from the Saarland University in Germany claimed to have developed a new software to track malicious activity by apps.

In late-July 2013, the Russian software company “Doctor Web” detected several malicious apps in the app store “Google Play”, researchers said.

Downloaded on a smartphone, these malware installed – without the permission of the user – additional programmes which sent expensive text messages to premium services.

Although Doctor Web, according to its own statement, informed Google immediately, the malicious apps were still available for download for several days, researchers said.

Doctor Web estimates that in this way up to 25,000 smartphones were used fraudulently.

The new software can discover such malicious apps already in an app store. The software detects pieces of code where the app accesses sensitive data and where data is sent from the mobile device – a “sink”.

If the software detects a connection between such a “source” and such a “sink”, it reports that as suspect behaviour.

Researchers demonstrated a malicious source-sink combination with an example.

“Your address book is read; hundreds of instructions later and without your permission an SMS is sent or a website is visited,” said Erik Derr, who does research at the Center for IT-Security, Privacy and Accountability (CISPA) of Saarland University.

To identify a functional relation between source and sink, the computer scientists use new methods of information flow analysis.

As input they provide suspicious combinations of accesses on the application programming interface. As the software needs a lot of computational power and storage, it runs on a separate server.

“So far, we have tested up to 3,000 apps with it. The software analyses them fast enough that the approach can also be used in practice,” Derr said.

Source: NDTV

“[katogoaward]”

Related

Share. Facebook Twitter WhatsApp Email
Previous ArticleT.I., Tiny Divorce Rumors: Tiny Allegedly Sexting Floyd Mayweather
Next Article Telecom giant pulls ads from Uganda anti-gay paper.

Related Articles

Talkio Mobile Opens Flagship Service Centre in Ntinda

Talkio Mobile Partners with 252 Lifestyle to Enable Convenient Airtime Purchases

TECNO unveils thinnest tri-fold smartphone – the PHANTOM Ultimate G Fold

TECNO Unveils SPARK 40 Series: Ultra-Slim, Ultra-Strong Built for the Long Run

UN Women Launches Coding Hub in Jinja to Empower Uganda’s Next Generation of Female Tech Leaders

TECNO CAMON 40 Series now available in Uganda

Latest News

Spice Diana Survives Shocking Attack as Boda Boda Rider Vandalizes Her Range Rover

October 18, 2025

Top 6 Ugandan Songs Dominating the Charts This Week

October 18, 2025

Kalifah AgaNaga Dismisses Alien Skin’s Claims to Legendary Status

October 18, 2025

Roast and Rhyme Returns With Soulful On Sun 2nd November

October 18, 2025

Alien Skin Explains Why He Has Not Joined Political Campaigns

October 17, 2025
Follow Us
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • TikTok
  • WhatsApp
BigEye.UG
Facebook X (Twitter) Instagram YouTube WhatsApp TikTok
  • Sitemap
  • Privacy Policy
  • Contact Us
© 2025 BigEye.UG | All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.