This page has moved to a new address.

"5 reasons why your Android Smartphone needs security"

----------------------------------------------- Blogger Template Style Name: Rounders Date: 27 Feb 2004 ----------------------------------------------- */ body { background:#aba; margin:0; padding:20px 10px; text-align:center; font:x-small/1.5em "Trebuchet MS",Verdana,Arial,Sans-serif; color:#333; font-size/* */:/**/small; font-size: /**/small; } /* Page Structure ----------------------------------------------- */ /* The images which help create rounded corners depend on the following widths and measurements. If you want to change these measurements, the images will also need to change. */ @media all { #content { width:740px; margin:0 auto; text-align:left; } #main { width:485px; float:left; background:#fff url("http://www.blogblog.com/rounders/corners_main_bot.gif") no-repeat left bottom; margin:15px 0 0; padding:0 0 10px; color:#000; font-size:97%; line-height:1.5em; } #main2 { float:left; width:100%; background:url("http://www.blogblog.com/rounders/corners_main_top.gif") no-repeat left top; padding:10px 0 0; } #main3 { background:url("http://www.blogblog.com/rounders/rails_main.gif") repeat-y; padding:0; } #sidebar { width:240px; float:right; margin:15px 0 0; font-size:97%; line-height:1.5em; } } @media handheld { #content { width:90%; } #main { width:100%; float:none; background:#fff; } #main2 { float:none; background:none; } #main3 { background:none; padding:0; } #sidebar { width:100%; float:none; } } /* Links ----------------------------------------------- */ a:link { color:#258; } a:visited { color:#666; } a:hover { color:#c63; } a img { border-width:0; } /* Blog Header ----------------------------------------------- */ @media all { #header { background:#456 url("http://www.blogblog.com/rounders/corners_cap_top.gif") no-repeat left top; margin:0 0 0; padding:8px 0 0; color:#fff; } #header div { background:url("http://www.blogblog.com/rounders/corners_cap_bot.gif") no-repeat left bottom; padding:0 15px 8px; } } @media handheld { #header { background:#456; } #header div { background:none; } } #blog-title { margin:0; padding:10px 30px 5px; font-size:200%; line-height:1.2em; } #blog-title a { text-decoration:none; color:#fff; } #description { margin:0; padding:5px 30px 10px; font-size:94%; line-height:1.5em; } /* Posts ----------------------------------------------- */ .date-header { margin:0 28px 0 43px; font-size:85%; line-height:2em; text-transform:uppercase; letter-spacing:.2em; color:#357; } .post { margin:.3em 0 25px; padding:0 13px; border:1px dotted #bbb; border-width:1px 0; } .post-title { margin:0; font-size:135%; line-height:1.5em; background:url("http://www.blogblog.com/rounders/icon_arrow.gif") no-repeat 10px .5em; display:block; border:1px dotted #bbb; border-width:0 1px 1px; padding:2px 14px 2px 29px; color:#333; } a.title-link, .post-title strong { text-decoration:none; display:block; } a.title-link:hover { background-color:#ded; color:#000; } .post-body { border:1px dotted #bbb; border-width:0 1px 1px; border-bottom-color:#fff; padding:10px 14px 1px 29px; } html>body .post-body { border-bottom-width:0; } .post p { margin:0 0 .75em; } p.post-footer { background:#ded; margin:0; padding:2px 14px 2px 29px; border:1px dotted #bbb; border-width:1px; border-bottom:1px solid #eee; font-size:100%; line-height:1.5em; color:#666; text-align:right; } html>body p.post-footer { border-bottom-color:transparent; } p.post-footer em { display:block; float:left; text-align:left; font-style:normal; } a.comment-link { /* IE5.0/Win doesn't apply padding to inline elements, so we hide these two declarations from it */ background/* */:/**/url("http://www.blogblog.com/rounders/icon_comment.gif") no-repeat 0 45%; padding-left:14px; } html>body a.comment-link { /* Respecified, for IE5/Mac's benefit */ background:url("http://www.blogblog.com/rounders/icon_comment.gif") no-repeat 0 45%; padding-left:14px; } .post img { margin:0 0 5px 0; padding:4px; border:1px solid #ccc; } blockquote { margin:.75em 0; border:1px dotted #ccc; border-width:1px 0; padding:5px 15px; color:#666; } .post blockquote p { margin:.5em 0; } /* Comments ----------------------------------------------- */ #comments { margin:-25px 13px 0; border:1px dotted #ccc; border-width:0 1px 1px; padding:20px 0 15px 0; } #comments h4 { margin:0 0 10px; padding:0 14px 2px 29px; border-bottom:1px dotted #ccc; font-size:120%; line-height:1.4em; color:#333; } #comments-block { margin:0 15px 0 9px; } .comment-data { background:url("http://www.blogblog.com/rounders/icon_comment.gif") no-repeat 2px .3em; margin:.5em 0; padding:0 0 0 20px; color:#666; } .comment-poster { font-weight:bold; } .comment-body { margin:0 0 1.25em; padding:0 0 0 20px; } .comment-body p { margin:0 0 .5em; } .comment-timestamp { margin:0 0 .5em; padding:0 0 .75em 20px; color:#666; } .comment-timestamp a:link { color:#666; } .deleted-comment { font-style:italic; color:gray; } .paging-control-container { float: right; margin: 0px 6px 0px 0px; font-size: 80%; } .unneeded-paging-control { visibility: hidden; } /* Profile ----------------------------------------------- */ @media all { #profile-container { background:#cdc url("http://www.blogblog.com/rounders/corners_prof_bot.gif") no-repeat left bottom; margin:0 0 15px; padding:0 0 10px; color:#345; } #profile-container h2 { background:url("http://www.blogblog.com/rounders/corners_prof_top.gif") no-repeat left top; padding:10px 15px .2em; margin:0; border-width:0; font-size:115%; line-height:1.5em; color:#234; } } @media handheld { #profile-container { background:#cdc; } #profile-container h2 { background:none; } } .profile-datablock { margin:0 15px .5em; border-top:1px dotted #aba; padding-top:8px; } .profile-img {display:inline;} .profile-img img { float:left; margin:0 10px 5px 0; border:4px solid #fff; } .profile-data strong { display:block; } #profile-container p { margin:0 15px .5em; } #profile-container .profile-textblock { clear:left; } #profile-container a { color:#258; } .profile-link a { background:url("http://www.blogblog.com/rounders/icon_profile.gif") no-repeat 0 .1em; padding-left:15px; font-weight:bold; } ul.profile-datablock { list-style-type:none; } /* Sidebar Boxes ----------------------------------------------- */ @media all { .box { background:#fff url("http://www.blogblog.com/rounders/corners_side_top.gif") no-repeat left top; margin:0 0 15px; padding:10px 0 0; color:#666; } .box2 { background:url("http://www.blogblog.com/rounders/corners_side_bot.gif") no-repeat left bottom; padding:0 13px 8px; } } @media handheld { .box { background:#fff; } .box2 { background:none; } } .sidebar-title { margin:0; padding:0 0 .2em; border-bottom:1px dotted #9b9; font-size:115%; line-height:1.5em; color:#333; } .box ul { margin:.5em 0 1.25em; padding:0 0px; list-style:none; } .box ul li { background:url("http://www.blogblog.com/rounders/icon_arrow_sm.gif") no-repeat 2px .25em; margin:0; padding:0 0 3px 16px; margin-bottom:3px; border-bottom:1px dotted #eee; line-height:1.4em; } .box p { margin:0 0 .6em; } /* Footer ----------------------------------------------- */ #footer { clear:both; margin:0; padding:15px 0 0; } @media all { #footer div { background:#456 url("http://www.blogblog.com/rounders/corners_cap_top.gif") no-repeat left top; padding:8px 0 0; color:#fff; } #footer div div { background:url("http://www.blogblog.com/rounders/corners_cap_bot.gif") no-repeat left bottom; padding:0 15px 8px; } } @media handheld { #footer div { background:#456; } #footer div div { background:none; } } #footer hr {display:none;} #footer p {margin:0;} #footer a {color:#fff;} /* Feeds ----------------------------------------------- */ #blogfeeds { } #postfeeds { padding:0 15px 0; }

Monday 9 April 2012

"5 reasons why your Android Smartphone needs security"


Andy Rubin, co-founder of Android, says that there are nearly 850,000 new Android devices activated on a daily basis since February 2012. Since its inception in 2007, Android has grown at a phenomenal rate and has inched closer to toppling the massive ecosystem that Apple founder, Steve Jobs initiated. At the recently concluded Mobile World Congress, Google highlighted a year on year growth of 250% giving out an estimate of 300 million for the total number of Android devices present worldwide.
Amidst all the fanfare and acclaim that this Linux based OS has garnered over the years, Android users are gradually waking up to unprecedented attacks by malicious software,
adware, scareware, trojans and other potent forms of viruses that can severely cripple a handheld device. The simplest justification for these attacks being the fact that the greater the number of devices in circulation, the higher will be the potent threats actively working to harm the device. These threats will present themselves in many forms and variations leaving it to the user of the device to ensure that such threats are rendered harmless with the help of the right tools.

For anyone who is still wondering if security tools and programs are necessary for Android users, the investment is worthwhile and should not be deliberated upon twice. It is simply fair to assume that since there are so many devices being sold on a daily basis, sooner or later an even potent threat will emerge on this platform. Today, the Android Market (or the Google Play Store) showcases around 450,000 applications for download and a majority of these apps are not put through the stringent security measures and testing procedures that Apple mandatorily carries out. As a result, a user can end up downloading a malicious app that could transmit valuable data to a remote system, or access confidential information carried by another app or even send out spam text messages to everyone on the contact list of the device. Here are the 5 major reasons why properly securing your Android device is necessary:-

BYOD threats
Enterprises are debating about the BYOD (Bring Your Own Device) issue today, as employees increasingly demand that they be allowed to use their own Smartphones and tablets at the workplace. While this is convenient and raises employee morale, the real danger of confidential information getting leaked out cannot be ignored. An employee using his personal Android device to exchange work related mails and to deal with other valuable data, is a perpetual risk to the company as the device could fall into wrong hands, or simply be destroyed. To protect an Android device against such risks, proper security measures on the device are absolutely essential.

Open source software
The very nature of Android as an operating system is something that works against it as far as security is concerned. As part of the Android Open Source Project (AOSP), Google provides the Software Development Kit (SDK) and the Native Development Kit (NDK) to one and all to make sure that the end users get a real world product without any compatibility issues. While this is Android’s biggest strength, it is also ironically, its biggest weakness. Since there are no copyright infringements involved, anyone is free to adapt the development kits, modify them and distribute them. In short, this is a malware developer’s dream.

Failure to read permissions
A major feather in the cap of Android, vis-a-vis Apple, is the fact that the user can actually view the permissions that an application is asking for before downloading and installing the application itself. These permissions range from modifying or deleting SD card contents, sending SMS and MMS messages to gaining Internet access over the data connection of the device and gathering information about the users location using the GPS signal. But the problem with this is that most users do not read these permissions carefully and base their judgments solely on the user comments that are posted along with the application. There is always a possibility that these comments are fraudulent where the ignorance of users can prove extremely harmful to their devices and the valuable information that it holds. Possessing sound security measures in the device can warn the user of the presence of a dangerous application even before it is installed.

Third party applications
In spite of there being a large number of games and applications available in the Android Market, people often resort to downloading applications from a third party source. This is something that is strictly prohibited by Apple, but Android in all its open sourced resplendence, allows this feature to exist. Needless to say, this multiplies the risk exposure of an Android device to any application that can be installed on the device with the permission of the user and infect it. A trustworthy security measure will ensure that all downloads of third party applications go through a proper screening and effective filtering process.

Human errors
One of the major reasons why you need security on your handheld devices, something that is not restricted to Android devices, is the mobility of these devices. Unlike a desktop, which you cannot carry around in your pocket, a Smartphone or a tablet can be easily misplaced, damaged or stolen at any point in time. This could lead to a loss of valuable data or even worse, it could lead to the data falling into the wrong hands. Security features like a screen lock, a remote lock, remote wiping of data and automatic erasing of data amongst others, are features that can prove useful to one and all. Some people also end up clicking on links and opening misleading attachments that attack and infect their device. A structured security program can negate the effects of such threats.

Some may argue that since Android is based on the Linux architecture, security threats cannot be highly potent for this medium. Additionally, it is also true that Android restricts an application from accessing the information possessed by other apps on the device, so the chances of a malicious app stealing data from all the resources of the device are minimal. Moreover, when an application is being downloaded from the Market, it asks for the user’s permission to access certain resources. This is a useful way of filtering out suspicious applications. For instance, if a game asks for permission to scan your text messages, you can simply choose not to download this particular application.

Even though such measures are in place, we cannot discount the possibility of a virus attack on an Android device. So the best course of action to take would be to simply ensure that the device is protected by a proactive security suite and by regularly updating it. With adequate foresight, you can easily thwart any malicious threats that may arise and ensure that your Android device works smoothly and effortlessly.

Labels: , ,

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home