Android Security
Recently, there has been a fairly large increase in the number of security threats to android devices. This comes as a result of the ever increasing use of smartphones and other connected devices where attempts to gain access to the user’s device are becoming more and more successful.
These threats can include Malware, Ransomware and Phishing Emails. There has also been a big increase in the amount of phishing emails appearing in inboxes. These phishing emails will usually take you to a site containing vast amounts of malware and worms which will infect your device in the same way they would infect a computer.
This malware will attach itself to the user’s android device, usually to the operating system (OS) or another executable file such as an application, which will run the malware script when the application is launched. If your device becomes infected by the malware it can do any number of things, for example collecting personal data and passwords cached on the device.
Mobile devices can also be exploited as an easy way to infiltrate a business. Consider this: a device which has been infected and now has a smartphone-pen test-framework (SPF) on it. This device is then introduced into the business by an unsuspecting employee, where the employee thinks what they are using is a harmless news app. This app is also communicating with the SPF console in the background, exposing the device’s user data. This android device is connected to the Wi-Fi the same as most portable devices are. The network it is connected to is shared by many users within the business which allows the SPF to breach other devices on the network. These devices may be laptops which will more than likely contain company documents which can now be seen by the hacker.
Most smartphones still do not come with any antivirus software installed as standard, which leaves the device vulnerable to attack and makes it an easy target for malware and viruses. Mobile antivirus is something that most people do not give a second thought to. Consequently, it is of paramount importance to protect mobile devices as they are used more and more in the business environment. They are often used as a means of working outside of the office, meaning that company data may be stored on mobile devices in order for the employee to carry out this work.








