Android: The One That Gets All the Attention - Developers, Hackers and YOU

Everybody loves Android

Android is considered one of the best operating systems used in smart phones. This operating system is backed by Google, the number one search engine. The Google Play has become an obsession now, enjoying the biggest number of smart phone apps. Many of them are absolutely free. But what if we tell you that Android is the easiest operating system to hack) and even customized apps such as Gmail can be hacked. Recently it was checked and confirmed that Gmail is one of the top endangered apps, which can be hacked very easily.

This hack is done by disguising malicious software engineered by unfortunately smart people. They created a copy of Gmail app and waited for the victims whoever downloaded that copy to their Android phone. Personal and monetary correspondence would be at the mercy of the programmer. Android devices are vulnerable to hacking that it can be done anywhere any time. For instance, a hacker might have his equipment in his side pocket, all what he has to do in order to hack your Android phone, is to get closer to your device. This literally means that a person that you shake hands with, a passenger who you visit with or even the stranger whose shoulder brushes against yours, can hack all your personal and financial dealings done through Android apps.

It is expert opinion that totally opposite to public opinion, when it comes to security threats, Apple’s iOS is somewhat more immune than Android to hack due to stronger regulations on what they allow to be published in the App Store, according to David Shamath from Times of Israel. Another big problem is Android’s design. Unlike iOS, Android was not designed by a company specializing on mobile operating system. Google is primarily a search engine, and their approach was to design an open-for-all OS. Programmers, developers have much more powers to make the mobile apps work whichever way they want to.

When you read that financial apps for Chase Bank, Amazon or WebMD, big brand names, were found vulnerable to hacking attempts, do you ask how easier it is to hack the rest?

And it doesn't stop there. Advanced cybercriminals can take control of your Android mobile’s mic and camera without needing special equipment or software. This can be done easily through tools, available online for free. This issue has become importance when we realize that Android is the OS used by over 80% of the world’s smart phone users. Do we ask users all to switch to iOS or demand Google to impose a stricter policy on the App Store? The first is unlikely, and the second is absolutely not. Open-source is a good thing and should continue this way. But to continue, we need to deal with current security issues impacting Android users and developers.

Need help or have any question, contact us at support@seacat.mobi and follow us @SeaCatMobi

Photo credit: imcreator


TurboCat.io

Data encryption tool for GDPR

More information


You Might Be Interested in Reading These Articles

MazelTov and the Russian Underground Have It Going for Your Android Devices. But Not for Good Reasons

The Internet has been a good place for individuals and businesses. However, it's fast-becoming a leading medium for criminals in this cyber war against people like you and I. One example is the Russian underground that sell anything to do with cyber crime. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents.

Continue reading ...

security

Published on May 19, 2015

Connecting the Unconnected. Securing the Internet of Things (IoT)

The Internet of Things (IoT) has unleashed new trends, and things are now labeled Smart-X (X = things). We can now connect the unconnected like cow or Barbie doll. But anything that can be connected can be hacked.

Continue reading ...

IoT security

Published on July 14, 2015

Develop Enterprise Mobile Apps? Turn Application Security into Profit instead of Cost

More than 3/4 of enterprises have experienced mobile security breaches. These breaches cost larger enterprises approximately 3 million dollars. One reason is the build cost to properly implement mobile application security measures.

Continue reading ...

mobile security

Published on September 29, 2015