Facebook
Name
Email
Phone
Message

Flawed Android Devices Open To Malware Threat

Flawed Android Devices Open To Malware Threat

In these times when everyone is connected to everyone else 24/7, mobility is an ever more crucial facility. The ability to work from home or whilst out on the road can make a major contribution to a company’s revenue stream and bottom line but unfortunately security is rapidly becoming an issue. Those users who do not have enterprise mobility management policies in place could well be at risk from a recently discovered and alarmingly severe threat.

Threat Alert

Researchers at the Universities of California and Michigan have found a flaw in Android devices that effectively allows applications to be hacked. It’s believed that this flaw can even be used in attacks on iOS and Windows Mobile applications. Their paper was presented recently at the USENIX Security Symposium where it caused considerable discussion and concern.

According to researchers, intrusion requires a malicious application to run in the device’s background. The app is virtually unidentifiable to the average user as it uses very little battery energy and only requires a handful of permissions. The window manager, a graphic interface framework housed in the shared memory area of a tablet or smartphone, is used by the malicious mobile program. The app could theoretically interfere with around 92 per cent of devices targeted and was particularly effective in disrupting Gmail. Hackers could use the malicious app to view a replica of the user interface in addition to obtaining image files through the device’s camera.

Prevention

Fortunately, mobile application manage software is able to mitigate the effects of such malicious apps (and there is more than one) by sandboxing applications and avoiding memory sharing between them. According to Sanjay Poonen, manager of end-user computing at VMware, IT departments that do not quickly adapt to our increasingly mobile influenced world are at increased risk of serious attacks, and ultimately extinction.

The research raised serious concerns about the newly introduced bring-your-own-device policy now operating across many businesses. If companies do not use MAM software, their systems could be at risk from a malicious application which could in effect be customised to attack one specific operating system. Those enterprises that do install MAM software suites on each and every user’s own device will stay immune from attack. MAM software suites are specifically built for each separate operating system and combat hacking using malicious programs by restricting memory sharing.


In conclusion

Mobility is obviously the way forward for modern business, but it’s crucial that companies are aware of serious threats to data security and put systems in place to combat it. There will always be hackers and mischief-makers out there; it’s just a case of keeping one step ahead and making their lives as difficult as possible.


Image: Shutterstock

Recommended Posts | Mobile Management

The Benefits of Mobile Solutions For Businesses
1998

The Benefits Of Mobile Solutions For Businesses

Technology moves on at such a pace everywhere in the world and the latest advances in information and communications technology are constantly raising expectations for everyone. Now we all expect to be able to access the World Wide Web on all our devices 24/7. Benefits From Such Mobile Technology ...
LTE - Long Term Evolution
2228

What Is LTE Technology - Long Term Evolution

Technology used in mobile networks has been improving continuously for the past decade. Presently we experience the 4G technology that provides us with high speed data transfer rates. However, there is a new thing called the LTE technology. It will be interesting to explore this technology ...
Security of Your Cell Phone
1010

10 Tips to Improve the Security of Your Cell Phone

With the use of mobile devices like cell we constantly keep in touch, we sailed on the internet are very useful for various daily activities, most focused on work and leisure. As important as your phone tool, should be protected and free from vulnerability because in it are passwords, videos, photos ...
security concerns building mobile app
2038

Building an App for a Business Main Security Concerns

Mobile apps - a lucrative business, with more than million apps now accessible through the Google Play Store. This exponential growth has been triggered by the rise of branded commercial applications, which has heralded the dawn of app store optimization and created competition among developers ...