CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Google Bringing the Android App Permissions Section Back to the Play Store

admin by admin
July 24, 2022
in Information Security


Google on Thursday said it’s backtracking on a recent change that removed the app permissions list from the Google Play Store for Android across both the mobile app and the web.

“Privacy and transparency are core values in the Android community,” the Android Developers team said in a series of tweets. “We heard your feedback that you find the app permissions section in Google Play useful, and we’ve decided to reinstate it. The app permissions section will be back shortly.”

To that end, in addition to showcasing the new Data safety section that offers users a simplified summary of an app’s data collection, processing, and security practices, Google also intends to highlight all the permissions required by the app to make sense of its “ability to access specific restricted data and actions.”

CyberSecurity

The reinstatement comes as the internet giant moved to swap out the apps permission section with the newer Data safety labels last week ahead of the enforcement deadline on July 20, 2022, which requires developers to provide information about “how they collect and handle user data for the apps they publish on Google Play.”

A quick check, however, shows that apps like Tor Browser, Discord, and those from Amazon, including its namesake app, Kindle, Alexa, Amazon Music, and Amazon Photos, continue to not include a Data safety section.

The new system also comes with its own set of problems in that it completely relies on the developers to make “complete and accurate declarations,” potentially leading to scenarios where it could be misleading or flat-out inaccurate.

In contrast, the apps permission list is derived from the permissions declared by the developer in an app’s manifest file.

CyberSecurity

It’s worth noting that the Apple App Store has a similar policy in place for its privacy “nutrition” labels that allows developers to highlight “self‑reported summaries of some of their privacy practices,” a method that, as a report from The Washington Post found, “falls short of being helpful.”

Google, however, states in its support documentation that it may take appropriate enforcement action if it runs into cases where there is a discrepancy between an app’s behavior and its declaration.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

3 Problems with Just-in-Time Planning and Solving Them with Agile Planning

Next Post

How Improving the Focus on Employees Could Drive Tremendous Business Results

Related Posts

Information Security

New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

by admin
August 7, 2022
Information Security

Spring 2022 PCI 3DS report now available

by admin
August 7, 2022
Information Security

Tech giants pledge self-regulation in NZ pact

by admin
August 7, 2022
Information Security

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

by admin
August 6, 2022
Information Security

Class Action Targets Experian Over Account Security – Krebs on Security

by admin
August 6, 2022
Next Post

How Improving the Focus on Employees Could Drive Tremendous Business Results

Recommended

New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

August 7, 2022

Spring 2022 PCI 3DS report now available

August 7, 2022

Tech giants pledge self-regulation in NZ pact

August 7, 2022

Will Oracle Save the Day with Its EHR database?

August 7, 2022

Illuminatecreativity

August 7, 2022

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

August 6, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.