website developer singapore,ios app development singapore,web development company singapore,ios developer singapore,mobile apps development singapore,singapore web design services,mobile app development singapore,web design singapore,singapore mobile app developer,mobile apps singapore,developers in singapore,web design company singapore,developer in singapore,website development singapore,mobile application developer singapore,design firms in singapore,mobile application development singapore,web application singapore,mobile game developer singapore,android developer singapore,web development singapore,singapore app developer,web designer singapore,app developer singapore,singapore web design,design agency singapore,web design services singapore,graphic designer in singapore,singapore website design,mobile developer singapore,app development singapore,mobile app developer singapore,website designer singapore,ruby on rails developer singapore,singapore web development,website design singapore,singapore mobile application developer

[Mobile Game] God’s Rage

[Mobile Game] God’s Rage

Mobile Game: God’s Rage God’s Rage IOS God’s Rage Android A mortal human is in love with your divine daughter. Stop him before he reaches her! A mobile game developed by our very own team, God’s Rage is a reverse runner that put the player’s reaction skills to the test. The game is now out on App Store and Google Play....
Mobile App Security

Mobile App Security

The security of mobile applications is a serious and growing concern for users and mobile application market places (Apple’s App Store, Google Play, BlackBerry® World™, Windows Phone Store), where users are the target and the market places enable the delivery of malware. We have reviewed the recent history of the mobile space, looking at the vectors available to hackers and malware producers. We’ll highlight some facts and figures that should cause many to rethink the device that they give all their information to, and carry everywhere with them. Mobile App Security When an application is submitted for inclusion on any of the main supplier stores it is scanned for malware and its usage permissions are collated and presented to the user. They range from “network level access” which basically “should” mean the application requires connection to the internet. However more and more applications seem to include the permission “collects location information” or “collects personal information such as contacts”. For many applications this can be a boon, applications such as Facebook will use this to tag where a photo is taken and suggest other users of Facebook to you, based on their email address or mobile number contained in your contacts list. The flip side of this is the growing number of applications that harvest the information for no application based reason and seemingly just because they can. This can also affect application updates. Permissions changes are again highlighted to the user but often in high level/technical language and without the user comprehending the purpose or usage of that collected data. The lesson for users is, if they choose to...
Page 1 of 212