Home Business IT Security Android users need not worry about latest security flaw
Android users need not worry about latest security flaw Featured

Over the last few days media has led with stories from Bluebox Security that “99% of Android handsets released in the last four years are vulnerable to a new security flaw.” This is nothing but a media beat up.

“There's a big difference between ‘hackers can control almost any Android phone’ and ‘hackers can control almost any Android phone after its user has installed a piece of malware” iTWire contributor Stephen Withers said.

Fact: The vulnerability could allow data theft or hijacking of almost all Android devices ONLY IF they install a ‘trojanised’ app. In order to do this Android must be rooted. There have been no instances of this vulnerability reported to Google in February, having been exploited.

“If you read what Bluebox had to say it appears that the vulnerability is not itself an issue as long as the user doesn't install a Trojanised app” he said.

Google has made sure that apps that exploit the issue do not get into Google Play. Yet another reminder that Android is open source and Google can only check apps in Play for their pedigree.

Opinion

This issue is a wider part of the risk of using the Android ecosphere. With the fragmentation (number of older versions of Android) and the heavy customisation that handset makers do it is almost impossible for Google to issue global security patches for fear of breaking Android on more than 1 billion Android handsets comprising more than 4,500 different model.

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Connect