Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

1/6/2014
01:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SnoopWall For Android App Now Available

SnoopWall provides cybersecurity, personal privacy, granular management of Apps Permissions and device data ports on Android phones and devices

LAS VEGAS, NV and NASHUA, NH – January 7, 2014 – As more than 152,000 attendees gather this week for CES 2014, there's good news for consumers concerned about ensuring personal privacy as they use smartphones, tablets and other mobile devices.

SnoopWall (http://www.snoopwall.com) the world's first counterveillance security software company, today announced its SnoopWall for Android App is now available as a free download from the Google Play Store at http://bit.ly/SnoopWallGooglePlay.

SnoopWall is first-of-its kind, counterveillance anti-spyware software to protect consumers, families and businesses from cyber-security threats and privacy invasions of their personal computers and mobile devices. SnoopWall uniquely blocks eavesdropping in real-time, protects your webcam, microphone, GPS, Bluetooth, NFC, Wi-Fi and other high risk data ports, automatically. Uniquely, there are no updates necessary for SnoopWall to stop new Zero-Day Malware and Advanced Persistent Threats (APTs).

A well-publicized December 12, 2013 article from the Electronic Frontier Foundation1 described a "massive privacy problem," 1 caused by Google's removal of its App Opps feature that gave Android users fine-grained control over App permissions. In this article, the EFF's Peter Eckersley described the disappearance of App Ops as "alarming news for Android users," suggesting that Google's move forces users "to choose between either privacy or security on the Android devices, but not both."

SnoopWall addresses the Google privacy problem through easy to use Apps Permissions controls that let users manage which permissions to give or deny to each Application on their Google Android device. This privacy and security feature lets users disable the ability of individual Apps to access sensitive, personally identifiable information such as geographic location and address book data.

Previewed at the world-renowned DEMO conference in October, SnoopWall for Android is the company's first product. Additional products providing privacy for computers, phones and other mobile devices running on the Apple iOS and Microsoft Windows platforms are in development.

SnoopWall for Android Features and Benefits:

Quick and easy to install – deploys on device in 30 seconds or less

Compatible with Google Android platforms, phones, devices and tablets

Finds out what every Application is doing, which are spying on you, and helps maintain personal privacy through easy Apps Permissions controls.

Alerts users of existing harmful and potentially harmful programs and Apps

Protection against spying, snooping and stealing for Android devices

Blocks cyber intrusion with revolutionary spyware blocking technology

Protects all high-risk data ports (webcam, microphone, GPS, wireless, Bluetooth, etc.)

from the latest, most dangerous malware

Understand risks with real-time privacy meter

Free up memory and extends battery life

"We're thrilled to launch SnoopWall for Android – proudly made in the USA," said Gary S. Miliefsky, President of SnoopWall and a founding member of the U.S. Department of Homeland Security. "From recent news of the FTC crackdown on one of the most popular flashlight Android Apps to widespread public dissatisfaction with Google's App privacy limitations; and from advertisers spying on consumers to the cyber snoop who illicitly gained remote access to Miss Teen USA's webcam and attempted to cyber-extort her -- it's time we took control of these devices to reclaim our privacy!"

Threats to Mobile Security

A research paper on "Cyber Security and Mobile Threats" clearly defines the need: "Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however... this...has caused an increase in cyber attacks ... Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry)."2

Android Privacy in Peril

Android users are particularly vulnerable to privacy threats, as recent research reveals:

Of the top 100 Android apps, 56 accessed device ID, contact lists and/or location data." 3

60% of infected mobile devices are Android smartphones, with the number of Android malware samples increasing by 72% in Q3 over Q2 2013. 4

SnoopWall: Reclaim Your Privacy

While "end-point" security products such as anti-virus and firewall software provide a degree of protection, cyber crooks and snoops can easily access smartphones & mobile devices through open data ports and nasty new malware/spyware hidden in "trusted" Apps.

SnoopWall's revolutionary anti-spyware software flags and prevents cyber security threats and also functions as a "port authority": detecting and blocking remote control, spying and eavesdropping through attempted intrusions into cameras, webcams, microphones, GPS, USB, other ports of entry on computers, smartphones, tablets, and other mobile devices.

SnoopWall's patent-pending "counterveillance" technology provides Data Leakage Prevention (DLP), threat prevention & privacy assurance, Apps Permissions management, and policy-based granular controls (via API/SDK) through offerings that will appeal to consumers, enterprises and governments, and those that serve them.

About SnoopWall

SnoopWall is the world's first counterveillance software company focused on helping consumers and enterprises protect their privacy on all of their computing devices including smartphones, tablets, and laptops. SnoopWall augments endpoint security (antivirus, firewall, intrusion prevention) through patent-pending technology that detects and blocks all remote control, eavesdropping and spying and, while preventing data leakage and increasing device battery life/performance. SnoopWall's software is proudly made in the U.S.A. Visit snoopwall.com and follow us on Twitter: @SnoopWallSecure.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cleargrey
50%
50%
Cleargrey,
User Rank: Apprentice
1/7/2014 | 1:36:20 PM
re: SnoopWall For Android App Now Available
This article seems to me to be a mix of reporting, advertising and scaremongering. Granular app permissions is a good thing, but not for everyone. It's like when people believe they need app killers daily. Maybe I missed it but I didn't see any mention of the fact that if you restrict certain permissions on many apps, they will simply fail to work properly. According to my reading, granular app permissions was primarily a developer tool partly for that reason. Also, to say it finds "which are spying on you" is a bit of scaremongering or sensationalism. While it may still be true it can show all apps and all their access permissions, most of this can be seen when you install the app. While I loath the facebook app, it doesn't really spy on the user. A flashlight app using access to the contacts and the network however, that would be spying.
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
New Attack Campaigns Suggest Emotet Threat Is Far From Over
Jai Vijayan, Contributing Writer,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5216
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seei...
CVE-2020-5217
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could b...
CVE-2020-5223
PUBLISHED: 2020-01-23
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3...
CVE-2019-20399
PUBLISHED: 2020-01-23
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
CVE-2020-7915
PUBLISHED: 2020-01-22
An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator.