Tuesday, February 2, 2016

Android may have a dark face – PC World

And it would seem that this initial period was the most
 dangerous to users. The period when formed hundreds
 applications for practically nothing, or duplication
 simple functions. In practice, when Android only worked on his
 the popularity of such tools primarily affect
 system stability and smartphone.

 chart-ww-smartphone-os-market-share.jpg The share of individual platforms on the market
 of smartphones in recent years

It was not until many years later, when Android has become a mature and very
 a complex system, the spectrum of threats became real. On the one
 a simple reason. Android became the general scheme,
  today is used by more than 80 percent of smartphone users
 the world
(second iOS is less than 15% of users), and
 number of applications on Google Play more than 1.5 million.

And there are yet more independent website with applications. And even
 if each of them offers fewer items than Google Play, it
 the percentage of malicious programs there is even 20 times
 higher.

The huge popularity of Android works to the advantage
 cybercriminals

Now that Android has gained such a large user base, not surprisingly,
 that each institution whose functioning could move on
 digital plane, decided to benefit from this. Of course
 there are also other mobile systems, mainly iOS and
 Windows Phone, but it Android is now in the crosshairs
 cybercriminals
. While Google is like Windows, which
 thanks to the enormous popularity has become a target of attacks malicious
 software. Less popular platforms like Linux or iOS seem
 safe, because fewer users are less Listed
 cases of cyber attacks. With Android is just like with cars
 and airplanes. It is the latter we consider to be dangerous, but only
 because almost everyone drives a car, and the threat that it
 it carries easily shrugged off.

First – a smartphone and Android are inseparable
 Friends

The above statement is not the complete truth, but each
 user smartphone running Google must realize that
 its security depends on the security of the system platform
 which uses. Last year, the laboratories G DATA
 posted about 2 million mobile malware

 (estimates, thousands of new submissions per day) which proves that
 upward trend in the number of threats persists and takes
 force. One should expect that each of them can affect
 also us.

The number of threats and infections for Android
 counts today millions

 samsung-797870_1920.jpg

Why? Smartphones have become inseparable companions in
 our work and private life. We use them as natural
 the way that we are not able to see the moment in which someone
 take over our data, overheard conversations, steal valuable files
 Memory smartphone, or steal money from your account. Is it
 made possible by a certain weakness of smartphones, which are also
 their strength. Of course we are talking about the rights they confer
 installed applications.

Second – applications typically want more than they need

The latest version of Android numbered 6 brings
 a very valuable function which is to inform users about the attempt
 use of its powers beyond the norm. But
 Marshmallow is installed so far only an insignificant number of
 smartphones (fortunately, this percentage increases), which means that only
 the percentage of users can count on this kind of support
 system.

android-994910_1920.jpg

But in this case, ignorance may lead to the fact that
 average user accepts the elevation for
 application access to data or functions of your smartphone. Just to
 be able to continue “comfortable” to use it.

screen1.jpg Torch functionality in both applications, and how
 different requirements. Some of them may be justified by additional
 functions, and yet all?

Each installed application needs certain
 permissions
to be able to carry out their functions. As in
 licensed social networking site or hosting pictures. Usually
 the request is for only the features you need, but sometimes list
 very extensive. In such situations, we should feel
 concerns and try to determine if you are sure the program must be
 access to the content of our e-mail, contact lists, camera or
 a microphone, and even image display management.

We are fighting for our safety, but
 often not where it is most important

Unfortunately, laziness makes you not care about such
 affairs, although we should. Paradoxically, in the case of services
 social networking or photo excited about excessive violations
 our rights, although in most cases without the required consents service
 he could not pursue as simple as viewing our operations
 avatar of another person, whether our photos to your friends. We fight, but not
 in the field where you need to. The threat may appear in our
 pocket.

Thirdly – even with the official application store can be
 dangerous

Google policy provides oversight made available on Google
 Play applications, but it is not as tight as in the case iOS
 (also not 100 percent safe, but do not install
 applications outside the App Store as in the Android and even Windows
 10).

 screen2.jpg

Even the official store may enter harmful
 applications and with this be reckoned with. Google Play recently removed from
 applications store 13, which, after installation of received powers
 Administrative. This allowed them to take control of the smartphone and
 intrude your system files (ie. rootowanie Android). IN
 Thus malicious tools can even survive
 restore the system
, which in the opinion of many people completely
 erases any unwanted data from the smartphone memory.

This is just the tip of the iceberg. Known case from 2015
 he is a card game Durak and application IQ Test, which hit the
 millions of smartphones before they were removed from Google Play. Also in these
 contains malicious code (sent, among others, Premium SMS), which
 action at first glance it is difficult to discern.

Pest highest level is much less than
 applications that are adware, but so potential
 the number of infected smartphones is huge.

Controlling date code applications million
 by the creators of Android is simply impossible

How to protect yourself from harmful mobile applications? Pose
 control required by no powers should be limited to
 we need only install the application. Directly from
 app store, not by external APK files (few
 Exceptions include. trial version G DATA INTERNET SECURITY for
 ANDROID
). Android anyway by default to block unattended
 the installation of such applications.

screen3.jpg

It is worth checking the opinions of the network, store applications and
 even talk to your friends, among which the large
 the probability of someone already using the application chosen by us. AND
 in the end you have to remember to regularly updating downloaded
 tools – most of the amendments in the case of applications for Android
 safety concerns.

No one can forbid so-called malicious application
 the same as the high reputation. Therefore, not only sugerujmy
 name

You should also avoid modification of the system beyond what
 They provide its updates. Breaking locks that allow you to
 the use of unofficial functions or modified versions
 always involves risk and makes it easier for cybercriminals hacking into
 the device.

The following summary of certain harmful activities which may
 call humanoid malware. This is just a small selection. (source:
 spreitzenbarth.de).

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Type of Action family of malware
Trojan that steals your contact list Ackposts
User buries ads Airpush
Sends Premium SMS Boxer
Takes unique identifiers mTAN
 You need when banking transactions
Carberp
Captures unsecured Internet sessions DroidSheep
takes over control of the device.
 captures all data and communications
Droid Kingfu
Sends personal data and opens pornographic websites FakeTimer
Takes address book Find and Call
Allows remote access (type Trojan RAT), making attacks
 DoS / DDoS and manipulation of the activity and the content
 Smartphone
Ksapp
Initializes the buying process applications
 Chinese external stores with applications
MMarketPay
Steals personal data and GPS position data
 
PDASpy
Allows you download an application that
 takes control of the
RootSmart
Allows you to perform malicious activities in Windows
 smartphone through a USB connection to a computer
USBCleaver
is used to capture personal information,
 data needed for the banking operations. The defendant remote
 Management smartphones (RAT)
Wroba
Steals unique identifiers for transactions mTAN
 bank
ZitMo

Fourth – common sense when using the smartphone is
 base

I would get lost smartphone? Probably a lot of people for more
 considers likely to damage or fast display
 installing a malicious application. Sometimes it is, but when
 actually we lose control of our device test
 Undergoes our sense when first using
 from your smartphone.

 android.jpg

If you have used a lock and login zaszyfrowaliśmy
 memory, do not keep valuable data on your SD card, as well as
 We took advantage of the application that provides tracking device or
 erase data, there is a good chance that losses will be
 small.

However, when the smartphone is protected with a simple gesture, and we do not
 we control its location, the consequences could be dire. And it
 only when something like this happens, we realize as
 a lot of valuable information stored on the smartphone without
 adequate security or backup
. It is worth
 Also remember what data we have provided with smartphone services
 Cloud, in the event of loss does not lose even those
 the data.

 screen4.jpg advertising attached to the application or
 Statement on the entire page. It does not have to be true, and just clever
 attempt to force us to go under unknown to us Link

The application or site suggests that our device is
 Infected? It is not true, unless it is a message packet
 Security. However, if this message is accompanied
 installed application or as a window pops up during
 Browsing the site of dubious reputation, it is 100 percent
 is false. It is an attempt to force our action, which can only
 end up installing malicious software. These
 suggestive messages, often supported by the awe-inspiring
 vibration is simple social engineering, which refers to
 our psyche
.

Never reagujmy on information about risks,
 Ads that accompany the applications or open as
 page in the browser

Wi-Fi is also a potential source of danger. Since
 so we attach importance to a secured wireless networks
 in the case of laptops, the more you should see to that in the case
 smartphones. Also in the case of Android, we can take advantage of
 Techniques encrypted secure connections through
 VPN
if we must necessarily send sensitive data.

 android1.jpg

With the above issue involves a question of trust to mobile
 banking transactions. Opinion on this subject, even among experts
 are divided – roughly half have serious reservations
 the safety of such operations. Therefore, although we are hot
 encouraged to this form of execution of orders, let’s
 ten times do we have to do in the area and unknown to us
 network.

Can we trust mobile banking applications, features
 contactless payments using a smartphone?

I wish I could answer yes and to reassure all
 KŚ readers. However, as for the road network should also
 apply the principle of limited confidence pages, application or
 users. Especially when it comes to our money. FROM
 certainly the creator of the bank care about mobile applications
 the safety of their users, but such appkach as in
 others may occur security holes. Sometimes reason is
 greater emphasis on comfort and functionality, others
 together is a simple human error. Hackers do not pass up this opportunity,
 therefore banking applications should always be possible
 current
.

If you already have to take advantage of mobile banking it
 Certainly not posługujmy a public Wi-Fi network, and on the phone
 or tablet Install a suitable anti-virus software.
 In the last year, up 4 banks with the Polish were the most TOP20
 attacked the world. Most likely, this year it
 will not change.

NFC is the convenience and the threat at the same time. In case of loss
 card number of transactions during which no authorization is required
 and the connection with the bank, up to 50 PLN can seriously deplete our
 budget. In our report threats with 2012 we paid
 attention to this new vector of attack and since that time we were already
 witness such unpleasant history
– says Robert
 Dziemianko, Marketing Manager at G Data. Here also
 we recommend that health care
– he added.

1.jpg

The last thing with which we have to realize is that,
 that cybercriminals do not always seek to enforce data loss from
 smartphone, which alerts us immediately. The smartphone, on which
 action has custody of specially crafted Trojan may be
 back door that allows criminals to track our
 activity, take control of our finances and more
 activities, including espionage. Therefore, many
 enterprises do not allow any disposition by company
 smartphones, and prohibits the use of private devices
 company.

Fifth – Android as Windows also needs package
 Security

Android includes basic tools
 security and features such as Android Device Manager
 allows you to remotely manage the contents of the smartphone and its
 location. However, for comprehensive protection it is necessary
 dedicated tool. It may be, for example, pack G
 DATA INTERNET SECURITY for Android
.

Proper smartphone protection should be
 a priority for us the highest degree

The list of features of this application include:

  • Virus Protection
  •  
     

  • Antiphishing and filtering calls through the Web
  •  
     

  • protection against malicious applications
  •  
     

  • protection against malware
  •  
     

  • Filter voice calls and SMS, Premium numbers blockade
  •  
     

  • Advanced protection in case of loss of the device (including
     commands via SMS)
  •  
     

  • Lock when replacing SIM card
  •  
     

  • Blocking access to specific applications by using
     password
  •  
     

  • Protection Contacts
  •  
     

  • Security youngest users – family filter
  •  
     

  • Control Panel Action Center to remotely manage the protection device
     - Ac.gdata.de
  •  

The following screenshots show how powerful functions
 G DATA packet protection for smartphones. Most importantly, each of
 function has reasonable justification, and it is not only unnecessary
 ballast.

 screen5.jpg Main Menu and window status
 Application

screen6.jpg Control application permissions

 screen7.jpg Various lock functions

 screen8.jpg Security Options browser
 antiphishing protection applications

Using the full functionality G DATA INTERNET
 Security for ANDROID
need to buy a license for 80
 respectively. This is a negligible cost compared with the comfort and
 Security offered us the use of this application. By
 the first 30 days, you can use the package without limitation
 free.

 GDATA-670x470.png photo.
 Pixabay.com, Simon Cassis, bloomua | 123RF.com

LikeTweet

No comments:

Post a Comment