Is Android Really Vulnerable In Security Space?

Must Read

Can CBD Gummies Be Beneficial For College Students?

College students often feel more pressure than they have ever—or will ever—feel in their entire lives. Many...

Will You Buy iPhone 12 Pro At US$20,500?

if you are suspecting any typo error here, you are highly mistaken! The price of iPhone 12...

Cloud Computing is Redefining the Education Industry!

Today, the benefits of cloud computing are being recognized in educational industries around the world. Most of...

There has always been a lot of discussions about Android security space. A recent report has pointed out to Android as a less secured mobile OS worldwide, compared to BlackBerry and iOS. In addition to these, a majority of developers are still not willing to work with this platform. Recently, Microsoft offered  “Windows Phone device” to “Android malware victim”. The reason is quite obvious that openness of Google ecosystem and its liberal apps policies are worsening Android OS day-by-day. It does not mean that anyone can easily access the non-permissible data from the Android device. Indeed, there’s a big question that if some apps do not have even permission to be installed then how these apps are accessing the data from users’ devices? And also, which type of data it is?

Recently, Paul Brodeur stated on Leviathan Security Group site that he created a “No Permission” app for Android to explore the accessible data from users’ devices, even it was not permitted to be installed. He pointed out three vulnerabilities of Android OS, and among all, first was SD card directory access. We all know, every applications have at least read only access to the content of  the external devices. “No Permission” app succeeded to scan all SD card directory from the device which were not hidden. As per Android developers documents, there is not yet any security programming have been written for external storage of the devices.

Secondly, Brodeur succeeded to fetch the data/system/package.list files–which contains currently installed apps on the devices. In this way, he could scan each directories which are used by those installed applications.

Advertisements

And finally, the third vulnerability of Android devices is that anyone can access identifiable information about the device without the prior permission of PHONE_STATE, however, it’s not possible for others to read IMEI or IMSI, but they can read  GSM and SIM vendors IDs from the device.

Anyway, these issues are not fruitful of Android OS developers. The security risk implies the less numbers of businesses and professionals. It’s not possible for any OS to lure a large numbers of folks by integrating fastest browser and hundreds of thousands of apps. Users’ data security is foremost important, and Android will have to think about this.

4 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News

After Facebook, Now Twitter is Caught Abusing Phone Number For Ads

Thanatophobia, or fear of death, is a relatively complicated phobia. Similarly, fear of losing your digital accounts to...

Warren Buffett’s Stake In Apple Is Worth More Than Combined Valuation of All Startup Unicorns in India

The Oracle of Omaha has got an eye for a good bet and it's proven time and again. Once a popular critic...

Microsoft Aims Global Acquisition Of TikTok, Including India!

It seems like TikTok can finally shed its Chinese origin from all over the world. It has recently...

Will Google’s Move To Delete 2,500 YouTube Channels Add Fuel To The Fire With China?

The US-China trade war has started rearing its ugly head. Both sides are now turning to extreme measures on the digital front...

Will You Buy iPhone 12 Pro At US$20,500?

if you are suspecting any typo error here, you are highly mistaken! The price of iPhone 12 Pro is US$ 20,500 now...

Google Is Shutting Down Google Play Music

Google Play Music will soon be buried in Google's graveyard. The company has announced that by December the service will be completely...

In-Depth: Dprime

Facebook Subscription Model: Looking Beyond Ad Dollars?

Seldom do job listings create a stir this gripping. However, when the job listing in question is a stealth post from Twitter,...

Will The Online Food Delivery Market in India End Up Becoming A Two-Horse Race?

It's pretty much evident that the food delivery space in India is all set to get riled up soon enough as one...

Fantastic 4: Four Day Work Week A Flashpoint Of Innovation?

It has been an idea that has been mooted by many, perhaps also somewhat sceptically. From being a dark horse to becoming...

More Articles Like This