thesmallwave.com
Google: With our weak vetting, how could this have happened?
Meanwhile, dozens of apps were found to have the same type of access to sensitive information as known spyware does, including access to the content of e-mails and text messages, phone call informa…