Android: The One That Gets All the Attention - Developers, Hackers and YOU
Android is considered one of the best operating systems used in smart phones. This operating system is backed by Google, the number one search engine. The Google Play has become an obsession now, enjoying the biggest number of smart phone apps. Many of them are absolutely free. But what if we tell you that Android is the easiest operating system to hack) and even customized apps such as Gmail can be hacked. Recently it was checked and confirmed that Gmail is one of the top endangered apps, which can be hacked very easily. This hack is done by disguising malicious software engineered by unfortunately smart people. They created a copy of Gmail app and waited for the victims whoever downloaded that copy to their Android phone. Personal and monetary correspondence would be at the mercy of the programmer. Android devices are vulnerable to hacking that it can be done anywhere any time. For instance, a hacker might have his equipment in his side pocket, all what he has to do in order to hack your Android phone, is to get closer to your device. This literally means that a person that you shake hands with, a passenger who you visit with or even the stranger whose shoulder brushes against yours, can hack all your personal and financial dealings done through Android apps.
It is expert opinion that totally opposite to public opinion, when it comes to security threats, Apple’s iOS is somewhat more immune than Android to hack due to stronger regulations on what they allow to be published in the App Store, according to David Shamath from Times of Israel. Another big problem is Android’s design. Unlike iOS, Android was not designed by a company specializing on mobile operating system. Google is primarily a search engine, and their approach was to design an open-for-all OS. Programmers, developers have much more powers to make the mobile apps work whichever way they want to.
When you read that financial apps for Chase Bank, Amazon or WebMD, big brand names, were found vulnerable to hacking attempts, do you ask how easier it is to hack the rest? And it doesn't stop there. Advanced cybercriminals can take control of your Android mobile’s mic and camera without needing special equipment or software. This can be done easily through tools, available online for free. This issue has become importance when we realize that Android is the OS used by over 80% of the world’s smart phone users. Do we ask users all to switch to iOS or demand Google to impose a stricter policy on the App Store? The first is unlikely, and the second is absolutely not. Open-source is a good thing and should continue this way. But to continue, we need to deal with current security issues impacting Android users and developers.
Photo credit: imcreator
Most Recent Articles
- TeskaLabs helps LINET with cyber security compliance for medical devices
- TeskaLabs and University hospital in Pilsen launches a pilot of zScanner - open source mobile app for medical photo documentation
- EV Charging Station security demonstrator
- Five Ways AI And Machine Learning Can Enhance Cybersecurity Strategy
- C-ITS ITS-S Security microservice
You Might Be Interested in Reading These Articles
Distributed-Denial-of-Service (DDoS) Disrupted Gaming Industry During the Holiday - What You Need to Know
During the Christmas holiday, the Xbox and PlayStation networks at Sony and Microsoft game websites were taken down by a group of hackers called Lizard squad. This attack put thousands of users out of game playing. What a bummer huh? Originally, the FBI blamed the North Koreans for taking down the network--that is another story, but had since revised their assessment when the Lizard squad claimed responsibility for the attack.
Published on January 27, 2015
Cyberspace does not have boundaries. The internet is a truly international community, and it takes just milliseconds to reach a data source on a whole different continent. The internet is therefore an open arena for cyberattacks from across the world, where anyone can try to break their way into someone else’s data. We can see this daily in the news or on the specialized ICT news servers- the attacks never stop.
Published on June 06, 2017
Of course, this is a bold statement, but for those who deal with security issues from mobile applications, they can pinpoint where the flaw occurred with developers not taking security into account when developing mobile apps. Security takes the back seat to app functionality and remains as second thought.
Published on March 07, 2015