Is Android Really Vulnerable In Security Space?

Must Read

Hands-Free Resources: How Businesses Are Using AR to Make Workplaces Safe and Productive

The role of efficiency and ease in the modern world has become forefronted when it comes to technology, particularly...

Top Countries by App Downloads Q2 2021: India Dominates With 7 Billion+ Downloads [REPORT]

As the adoption of smartphones and the Internet has increased over the last decade, so has the number of...

3 Most Common Mistakes Social Media Marketers Are Committing In 2016

In their quest for greater sales and increased ROI, the self-appointed “digital marketing guru” has lost touch with what...

There has always been a lot of discussions about Android security space. A recent report has pointed out to Android as a less secured mobile OS worldwide, compared to BlackBerry and iOS. In addition to these, a majority of developers are still not willing to work with this platform. Recently, Microsoft offered  “Windows Phone device” to “Android malware victim”. The reason is quite obvious that openness of Google ecosystem and its liberal apps policies are worsening Android OS day-by-day. It does not mean that anyone can easily access the non-permissible data from the Android device. Indeed, there’s a big question that if some apps do not have even permission to be installed then how these apps are accessing the data from users’ devices? And also, which type of data it is?

Recently, Paul Brodeur stated on Leviathan Security Group site that he created a “No Permission” app for Android to explore the accessible data from users’ devices, even it was not permitted to be installed. He pointed out three vulnerabilities of Android OS, and among all, first was SD card directory access. We all know, every applications have at least read only access to the content of  the external devices. “No Permission” app succeeded to scan all SD card directory from the device which were not hidden. As per Android developers documents, there is not yet any security programming have been written for external storage of the devices.

Secondly, Brodeur succeeded to fetch the data/system/package.list files–which contains currently installed apps on the devices. In this way, he could scan each directories which are used by those installed applications.


And finally, the third vulnerability of Android devices is that anyone can access identifiable information about the device without the prior permission of PHONE_STATE, however, it’s not possible for others to read IMEI or IMSI, but they can read  GSM and SIM vendors IDs from the device.

Anyway, these issues are not fruitful of Android OS developers. The security risk implies the less numbers of businesses and professionals. It’s not possible for any OS to lure a large numbers of folks by integrating fastest browser and hundreds of thousands of apps. Users’ data security is foremost important, and Android will have to think about this.



Please enter your comment!
Please enter your name here

Latest News

Zomato To Give Booster Shot To Grofers Now: Eyes On A Big Chunk Of Grocery Delivery Market

After the historic performance with IPO, Zomato is now gearing up for another milestone - to grab a sizeable...

In-Depth: Dprime

Will ‘TikTok By Microsoft’ Be A Winner?

For the last two years, TikTok has been in the public eye for all sorts of reasons. First, it was the exploded and unparalleled...

Facebook Subscription Model: Looking Beyond Ad Dollars?

Seldom do job listings create a stir this gripping. However, when the job listing in question is a stealth post from Twitter, with a...

Will The Online Food Delivery Market in India End Up Becoming A Two-Horse Race?

It's pretty much evident that the food delivery space in India is all set to get riled up soon enough as one of the...

More Articles Like This