In April, it was reported that Microsoft was considering allowing users to install Office without installing Teams in an effort to appease regulators and avoid additional scrutiny or official investigations by the EC. Slack filed a complaint with the EU in 2020, claiming that Microsoft was "force installing for millions, blocking its removal, and hiding the true cost to enterprise customers." Reportedly, the EC and Microsoft are at odds over whether the pricing of Teams limits opportunities for fair competition from similar video conferencing apps such as Slack and Zoom. Windows 11 handwriting experience improved with latest Insider build Microsoft snuck out a new feature for fixing Windows 11 in a recent Insider build And Xbox chief Phil Spencer just made it officially official. Call of Duty is staying on PlayStation. How to get correct color profile for your monitor on Windows 11 The European Commission (EC) may be planning to investigate whether or not Microsoft's bundling of the video conferencing software Teams with productivity-based app subscription Office 365 was legal. Still, the gaming sector of Microsoft is not the only department currently under a regulatory microscope. Microsoft has gone head-to-head with the Competition and Market Authority (CMA) of the UK and the US's Federal Trade Commission (FTC) both recently as it moves to close the ABK deal. ![]() When it comes to Microsoft's entanglements with regulators, all eyes are currently on the Activision Blizzard King acquisition on behalf of Xbox. Reports in April of this year indicated that Microsoft was already contemplating separating the two products, possibly as a pre-emptive measure to prevent antitrust investigations.The European Commission is expected to investigate whether or not the pairing is a violation of antitrust laws.Microsoft bundles video conferencing app Teams with its productivity based Office 365 and Microsoft 365 subscriptions.Apple said this violated its rules and banned the apps by revoking enterprise certificates used by Facebook and Google, knocking both of their illicit apps offline, but also every other internal app signed with the same certificate.įacebook was unable to operate at full capacity for an entire working day until Apple issued a new certificate. But several companies, like Facebook and Google, used their enterprise-only certificates to sign apps given to consumers. Every app served through an app store has to be certified by Apple or they won’t run. It follows a similar pattern to several app makers, as discovered by TechCrunch earlier this year, which abused their enterprise certificates to develop mobile apps that evaded the scrutiny of Apple’s app store. Instead, Connexxa signed the app with an enterprise certificate issued to the developer by Apple, said Bauer, allowing the surveillance app maker to bypass Apple’s strict app store checks.Īpple says that’s a violation of its rules, which prohibits these certificates designed to be used strictly for internal apps to be pushed to consumers. ![]() “This is one of the indicators that a professional group was responsible for the software,” he said.Īlthough the Android version was downloadable directly from Google’s app store, the iOS version was not widely distributed. Exodus had a larger feature set and expanded spying capabilities by downloading an additional exploit designed to gain root access to the device, giving the app near complete access to a device’s data, including emails, cellular data, Wi-Fi passwords and more, according to Security Without Borders. The Android app, dubbed Exodus, ensnared hundreds of victims - either by installing it or having it installed. Researchers linked the app to the makers of a previously discovered Android app, developed by the same Italian surveillance app maker Connexxa, known to be in use by the Italian authorities. ![]() Although there was no data to show who might have been targeted, the researchers noted that the malicious app was served from fake sites purporting to be cell carriers in Italy and Turkmenistan. It can be remotely triggered to listen in on people’s conversations, the researchers found. The disguised carrier assistance app once installed can silently grab a victim’s contacts, audio recordings, photos, videos and other device information - including their real-time location data. The spy app, found by researchers at mobile security firm Lookout, said its developer abused their Apple-issued enterprise certificates to bypass the tech giant’s app store to infect unsuspecting victims. Security researchers have discovered a powerful surveillance app first designed for Android devices can now target victims with iPhones.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |