Android Smartphone Security And Instagram App Testing

Android Smartphone Security

Our daily lives become more and more dependent on smartphones due to their high processing power and increased capabilities. Smartphones have features of both a mobile phone and a computer, allowing us to talk, text, tweet, email, browse the Internet, make purchases, manage bank accounts, and take pictures. “Smartphones’ popularity and relatively lax security have made them attractive targets for attackers to invade smartphones in various paths”.

 

Changes have been created in the mobile phone landscape with the introduction of smart phones running Android. Android is an open smartphone platform developed by the Google-led Open Handset Alliance. Scholars predict that the Android will control 45.4 percent of the market share by 2015 due to its open source nature and adoption by telecommunications providers worldwide. In fact, Open mobile platforms like Android provide an opportunity for consumers to access more applications. Applications can be installed on Android devices through the Android Market and other untrusted third party sites. Recent studies indicate that there are malicious applications that can be uploaded onto app stores and then successfully advertised to users. These malicious applications will access to a user’s personal information, all messages, network communication and services that cost money. Similarly, Kaspersky’s Internet security experts (2012) reported on more than 35,000 malicious Android programs. They explained the reasons for the huge growth in Android Malware:

  • The Android platform has become the most widespread operating system (OS) for new smartphones – it has over 70% market share. 
  • The open nature of the Android OS, the ease with which apps can be created, and the wide variety of (unofficial) application markets all have an influence on security.”

In line with this idea, a study has been recently conducted by a group of researchers at University of New Haven (UNHeFREG) to discover security issues within the social media, chatting, and dating app market on android. They observed app network traffic to find unencrypted data transmissions. They created a test network using Windows 7’s virtual miniport adapter. Then, they connected the android phone to this network to monitor all traffic being sent and received by the android device. An iPad was connected outside the test network and was used to exchange data to the android device. With this setup, they were able to capture a great deal of sensitive user information. In addition, they conducted server storage analysis and device storage analysis to find out how apps store user data on the server and device. Finally, they reported that anyone who uses many popular android apps (such as Instagram, Okcupid, ooVoo, Tango, Klk, Nimbuzz, MeetMe, MessageMe, TextMe, Grindr, HeyWire, Hike, and textPlus) is in danger of confidential data breaches. It would seem that the current Android security architecture and operating system cannot provide adequate security for Android mobile phone users.

As discussed above, the current Android security system has multiple flaws and Android users need new ways to protect their private personal data from a malicious attack. In order to improve our smartphone security, Fraces (2014) suggested several tips as follows: Selecting strong password or pattern; Installing and updating security solutions; Downloading applications only from trusted and reliable sources; Checking our apps permissions and rights; Performing regular updates of the O.S on our device; Preparing back up from our information frequently; Encrypting our confidential information; Beware of entering sensitive information on our smartphone; and Avoiding jailbraking or rooting of the device.

By Mojgan Afshari

Matrix

Are We Building The Matrix?…

When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...
Kelly Dyer

Healthcare Data Security: Why It Matters

Healthcare Data Security Today, electronic healthcare data exists at every point along a patient’s journey. So frequently is it being processed, accessed, and shared between multiple providers, that we’d be forgiven for forgetting the highly ...
Jim Fagan

Behind The Headlines: Capacity For The Rest Of Us

Capacity For The Rest Of Us We live in the connected age, and the rise of cloud computing that creates previously unheard of value in our professional and personal lives is at the very heart ...
Derrek Schutman

Implementing Digital Capabilities Successfully to Boost NPS and Maximize Value Realization

Implementing Digital Capabilities Successfully Building robust digital capabilities can deliver huge benefits to Digital Service Providers (DSPs). A recent TMForum survey shows that building digital capabilities (including digitization of customer experience and operations), is the ...
Threat Security

Azure Red Hat OpenShift: What You Should Know

Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...

CLOUD MONITORING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Opsview

    Opsview

    Opsview is a global privately held IT Systems Management software company whose core product, Opsview Enterprise was released in 2009. The company has offices in the UK and USA, boasting some 35,000 corporate clients. Their prominent clients include Cisco, MIT, Allianz, NewVoiceMedia, Active Network, and University of Surrey.

  • Nagios

    Nagios

    Nagios is one of the leading vendors of IT monitoring and management tools offering cloud monitoring capabilities for AWS, EC2 (Elastic Compute Cloud) and S3 (Simple Storage Service). Their products include infrastructure, server, and network monitoring solutions like Nagios XI, Nagios Log Server, and Nagios Network Analyzer.

  • Datadog

    DataDog

    DataDog is a startup based out of New York which secured $31 Million in series C funding. They are quickly making a name for themselves and have a truly impressive client list with the likes of Adobe, Salesforce, HP, Facebook and many others.

  • Sematext Logo

    Sematext

    Sematext bridges the gap between performance monitoring, real user monitoring, transaction tracing, and logs. Sematext all-in-one monitoring platform gives businesses full-stack visibility by exposing logs, metrics, and traces through a single Cloud or On-Premise solution. Sematext helps smart DevOps teams move faster.