UPDATED: Google boosts privacy amidst Android leak worries
As it moves to fix Android data leaking issues, the tech giant adds trust accreditation to Marketplace Apps.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Google has added trust accreditation to Marketplace apps as it deals with claims that almost all Android phones leak user data.
Yesterday, Google announced a TRUSTe administered data privacy certification programme for its Apps, designed to give customers confidence in the security of software on the market.
"TRUSTe has created a certification program for installable Marketplace apps to verify that they clearly communicate their data handling and privacy practices," said Scott McMullan, Google Apps partner lead, in a blog post.
"This programme, which is optional for vendors, displays a green TRUSTe logo on a certified app's Marketplace listing page as well as search results pages."
Customers who click on the logo will go through to a summary with more information about the app.
Android issues
Google has also moved to fix a vulnerability thought to affect the majority of Android phones.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
German researchers Bastian Konings, Jens Nickels and Florian Schaub, from the University of Ulm, found login data to Google services could be leaked over unprotected Wi-Fi networks.
The problem stemmed from the way in which apps interact with Google services to request tokens. Tokens were seen being sent in plain text over open Wi-Fi networks, allowing eavesdroppers to pilfer them.
This could have allowed hackers to get hold of users' calendar and contact data, or pictures via Picasa.
"This means that the adversary can view, modify or delete any contacts, calendar events, or private pictures. This is not limited to items currently being synced but affects all items of that user," the researchers warned in a blog post.
They claimed 99.7 per cent of all Android smartphones were affected.
Google said it had fixed the issue in the latest versions of Android, including the current Gingerbread and Honeycomb OSs.
"We're aware of this issue, have already fixed it for calendar and contacts in the latest versions of Android, and we're working on fixing it in Picasa," a Google spokesperson said.
Google Apps accounts were protected from the calendar and contacts vulnerability, however, as they send traffic over HTTPS.
UPDATE Google has sent over a new statement surrounding the Android flaw, saying an automatic fix would be rolled out soon.
"Today we're starting to roll out a fix which addresses a potential security flaw that could, under certain circumstances, allow a third party access to data available in calendar and contacts," a Google spokesperson said.
"This fix requires no action from users and will roll out globally over the next few days."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Why leaders need to build resilience to avoid AI burnoutIn-depth Stress levels are surging among those in leadership roles due to accelerating AI adoption – resilience is key to avoiding burnout
-
How practical-based learning for AI can close the digital skills gapEquipping the next generation of AI-engineers, developers, and leaders with hands-on experience and practical teaching resources is key
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
