Home Business IT Security Android users need not worry about latest security flaw

Android users need not worry about latest security flaw Featured

Over the last few days media has led with stories from Bluebox Security that “99% of Android handsets released in the last four years are vulnerable to a new security flaw.” This is nothing but a media beat up.

“There's a big difference between ‘hackers can control almost any Android phone’ and ‘hackers can control almost any Android phone after its user has installed a piece of malware” iTWire contributor Stephen Withers said.

Fact: The vulnerability could allow data theft or hijacking of almost all Android devices ONLY IF they install a ‘trojanised’ app. In order to do this Android must be rooted. There have been no instances of this vulnerability reported to Google in February, having been exploited.

“If you read what Bluebox had to say it appears that the vulnerability is not itself an issue as long as the user doesn't install a Trojanised app” he said.

Google has made sure that apps that exploit the issue do not get into Google Play. Yet another reminder that Android is open source and Google can only check apps in Play for their pedigree.

Opinion

This issue is a wider part of the risk of using the Android ecosphere. With the fragmentation (number of older versions of Android) and the heavy customisation that handset makers do it is almost impossible for Google to issue global security patches for fear of breaking Android on more than 1 billion Android handsets comprising more than 4,500 different model.

WEBINAR 26/27th May

Thinking of deploying Business Intelligence (BI)? So are your competitors.

And the most important, fundamental, tool for delivering your BI information to your users? Dashboards.

THIS IS ONE NOT TO MISS SO REGISTER NOW

DON'T MISS OUT - REGISTER NOW!

FREE WHITEPAPER - RISKS OF MOVING DATABASES TO VMWARE

VMware changed the rules about the server resources required to keep a database responding

It's now more difficult for DBAs to see interaction between the database and server resources

This whitepaper highlights the key differences between performance management between physical and virtual servers, and maps out the five most common trouble spots when moving production databases to VMware

1. Innacurate metrics
2. Dynamic resource allocation
3. No control over Host Resources
4. Limited DBA visibility
5. Mutual ignorance

Don't move your database to VMware before learning about these potential risks, download this FREE Whitepaper now!

DOWNLOAD!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Connect