Giving apps access to info stored on phone can be risky, here’s what you need to know

Agencies
January 3, 2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

The Mars Colour Camera (MCC) onboard ISRO's Mars Orbiter Mission has captured the image of Phobos, the closest and biggest moon of Mars.

The image was taken on July 1 when MOM was about 7,200 km from Mars and 4,200 km from Phobos.

"Spatial resolution of the image is 210 m.

This is a composite image generated from 6 MCC frames and has been color corrected," ISRO said in an update along with the image.

Phobos is largely believed to be made up of carbonaceous chondrites.

According to ISRO, "the violent phase that Phobos has encountered is seen in the large section gouged out from a past collision (Stickney crater) and bouncing ejecta."

"Stickney, the largest crater on Phobos along with the other craters (Shklovsky, Roche & Grildrig) are also seen in this image," it said.

The mission also known as Mangalyaan was initially meant to last six months, but subsequently ISRO had said it had enough fuel for it to last "many years."

The country had on September 24, 2014 successfully placed the Mars Orbiter Mission spacecraft in orbit around the red planet, in its very first attempt, thus breaking into an elite club.

ISRO had launched the spacecraft on its nine-month- long odyssey on a homegrown PSLV rocket from Sriharikota in Andhra Pradesh on November 5, 2013.

It had escaped the earth's gravitational field on December 1, 2013.

The Rs 450-crore MOM mission aims at studying the Martian surface and mineral composition as well as scan its atmosphere for methane (an indicator of life on Mars).

The Mars Orbiter has five scientific instruments - Lyman Alpha Photometer (LAP), Methane Sensor for Mars (MSM), Mars Exospheric Neutral Composition Analyser (MENCA), Mars Colour Camera (MCC) and Thermal Infrared Imaging Spectrometer

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 4,2020

Washington D.C: One of the greatest spectacles of modern art is still thriving in the Australian outback as confirmed by satellite imagery of NASA. The Marree Man is a massive geoglyph depicting an aboriginal hunter, that spans over 2.6 miles in the Southern Australian region.

Discovered by a pilot in 1998, its origin still remains a mystery even to this date.

The Marree Man was given a new lease of life in 2016 when a group of people from the neighboring town of Marree plowed its lines to avert its fading due to erosion.

After NASA shared the image of the art-work that was taken in June, the efforts of the good samaritans turned out to be a total success, reported CNN Travel.

The restoration team believes that the refurbished Marree Man would last longer than its original version.

According to NASA, "They [the team] created wind grooves, designed to trap water and encourage the growth of vegetation. They hope that eventually, the man will turn green."

In a previous article, CNN reported that an entrepreneur by the name of Dick Smith took upon himself to unravel the geoglyph's mystery in 2016. His team combed through all the available evidence but couldn't find anything conclusive.

In 2018 he even offered a 5,000 Australian dollar reward for anyone who knows the identity of its creator.

Nobody turned up with an answer but it was speculated that unknown artist lives in Alice Springs or even might be an American.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 24,2020

Melbourne, Jul 24: Home-made cloth face masks may need a minimum of two layers, and preferably three, to prevent the dispersal of viral droplets associated with Covid-19, according to a study.

Researchers, including those from the University of New South Wales in Australia, noted that viral droplets are generated by those infected with the novel coronavirus when they cough, sneeze, or speak.

As face masks have been proven to protect healthy people from inhaling infectious droplets as well as reducing the spread from those who are already infected, several types of material have been suggested for these, but based on little or no evidence of how well they work, the scientists said.

In the current study, published in the journal Thorax, the researchers compared the effectiveness of single and double-layer cloth face coverings with a surgical face mask (Bao Thach) at reducing droplet spread.

They said the single layer covering was made from a folded piece of cotton T shirt and hair ties, and the double layer covering was made using the sew method described by the US Centers for Disease Control and Prevention (CDC).

The scientists used a tailored LED lighting system and a high-speed camera to film the dispersal of airborne droplets produced by a healthy person with no respiratory infection, during speaking, coughing, and sneezing while wearing each type of mask.

Their analysis showed that the surgical face mask was the most effective at reducing airborne droplet dispersal, although even a single layer cloth face covering reduced the droplet spread from speaking.

But the study noted that a double layer covering was better than a single layer in reducing the droplet spread from coughing and sneezing.

According to the researchers, the effectiveness of cloth face masks is dependent on the number of layers of the covering, the type of material used, design, fit as well as the frequency of washing.

Based on their observations, they said a home made cloth mask with at least two layers is preferable to a single layer mask.

"Guidelines on home-made cloth masks should stipulate multiple layers," the scientists said, adding that there is a need for more research to inform safer cloth mask design.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.