Tech Crunch

Google, Mozilla team up to block Kazakhstan’s browser spying tactics

Google and Mozilla have taken the rare step of blocking an untrusted certificate issued by the Kazakhstan government, which critics say it forced its citizens to install as part of an effort to monitor their internet traffic. The two browser makers said in a joint
/
The Verge

US gives Huawei another 90 days before full ban takes effect

The United States will once again delay a full ban on doing business with Huawei, saying that rural communications companies needed the extra time to switch their equipment away from products made by the Chinese tech giant. President Trump initiated the Huawei ban in May with an
/

Android Smartphone Security And Instagram App Testing

Android Smartphone Security

Our daily lives become more and more dependent on smartphones due to their high processing power and increased capabilities. Smartphones have features of both a mobile phone and a computer, allowing us to talk, text, tweet, email, browse the Internet, make purchases, manage bank accounts, and take pictures. “Smartphones’ popularity and relatively lax security have made them attractive targets for attackers to invade smartphones in various paths”.

 

Changes have been created in the mobile phone landscape with the introduction of smart phones running Android. Android is an open smartphone platform developed by the Google-led Open Handset Alliance. Scholars predict that the Android will control 45.4 percent of the market share by 2015 due to its open source nature and adoption by telecommunications providers worldwide. In fact, Open mobile platforms like Android provide an opportunity for consumers to access more applications. Applications can be installed on Android devices through the Android Market and other untrusted third party sites. Recent studies indicate that there are malicious applications that can be uploaded onto app stores and then successfully advertised to users. These malicious applications will access to a user’s personal information, all messages, network communication and services that cost money. Similarly, Kaspersky’s Internet security experts (2012) reported on more than 35,000 malicious Android programs. They explained the reasons for the huge growth in Android malware:

  • The Android platform has become the most widespread operating system (OS) for new smartphones – it has over 70% market share. 
  • The open nature of the Android OS, the ease with which apps can be created, and the wide variety of (unofficial) application markets all have an influence on security.”

In line with this idea, a study has been recently conducted by a group of researchers at University of New Haven (UNHeFREG) to discover security issues within the social media, chatting, and dating app market on android. They observed app network traffic to find unencrypted data transmissions. They created a test network using Windows 7’s virtual miniport adapter. Then, they connected the android phone to this network to monitor all traffic being sent and received by the android device. An iPad was connected outside the test network and was used to exchange data to the android device. With this setup, they were able to capture a great deal of sensitive user information. In addition, they conducted server storage analysis and device storage analysis to find out how apps store user data on the server and device. Finally, they reported that anyone who uses many popular android apps (such as Instagram, Okcupid, ooVoo, Tango, Klk, Nimbuzz, MeetMe, MessageMe, TextMe, Grindr, HeyWire, Hike, and textPlus) is in danger of confidential data breaches. It would seem that the current Android security architecture and operating system cannot provide adequate security for Android mobile phone users.

As discussed above, the current Android security system has multiple flaws and Android users need new ways to protect their private personal data from a malicious attack. In order to improve our smartphone security, Fraces (2014) suggested several tips as follows: Selecting strong password or pattern; Installing and updating security solutions; Downloading applications only from trusted and reliable sources; Checking our apps permissions and rights; Performing regular updates of the O.S on our device; Preparing back up from our information frequently; Encrypting our confidential information; Beware of entering sensitive information on our smartphone; and Avoiding jailbraking or rooting of the device.

By Mojgan Afshari

Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

On-Premise VoIP vs PBX Services

On-Premise VoIP vs PBX Services

VoIP vs PBX Services The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if ...
Mark Kirstein Partner Experts

BitTitan Cloud Predictions and IT Migration Trends for 2019

IT Migration Trends The beginning of a new year is an ambitious time for people and businesses. Strategic initiatives are finalized, goals are set and ...
Cloud Security Tools

10 Useful Cloud Security Tools For Your Business

Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense ...
Work In The Cloud Era: Are We Ready For Virtual Teams?

Work In The Cloud Era: Are We Ready For Virtual Teams?

Getting Ready For Virtual Teams Technological developments are ushering in a new era of work. Cloud computing has changed not only the way we collaborate, ...
Reuters news

China cries foul over Facebook, Twitter block of fake accounts

/
BEIJING (Reuters) - China said on Tuesday it had a right to put out its own views after Twitter and Facebook said they had dismantled a state-backed social media campaign ...
Cisco News

Monetizing 5G – How Service Providers can get it right

/
5G will bring much more than unprecedented speed. The 5G architecture will profoundly transform the way we experience our homes and cities, will make enterprises smart, highly efficient and create ...
Door Dash

DoorDash reveals details of its new tipping model

/
DoorDash announced last month that it would be changing its controversial tipping model. Today it’s revealing the basics of how the new system will work. Under the past model, Dashers ...