Security Gaps in Web Apps
across two particularly common malware gateways for data spies”, says TZI staff member Karsten Sohr. One of these is that apps ask for a long list of authorizations, although many of them are quite superfluous [...] news and information. “We have identified 22 such authorizations, although the only really important one is to access the Internet. The more authorizations, though, the easier it is for spies to capture data