• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

How Safe is Your Android Device?

Updated on Oct 10, 2013 by Guest Authors

As though to brush off substantiated reports showing Android’s vulnerability to malware attacks, Google’s security chief Adrian Ludwig recently presented a report that claims the operating system’s security infrastructure successfully scanned 99.99 percent of app downloads and installations.

Ludwig raised valid points for all that. He said Google managed to thwart attacks by locking down Android at the device level, meaning its security model has isolated almost every kind of malware that Windows hatched over the years. Verify Apps is at the core of Android’s security mechanisms. The software examines an app before it is installed and weighs the results against Google’s data sets of malware information to notify users about potential risks.

The search giant has faith in warnings as the most forceful check to malware and that strategy has been around for more than a year now.

Android targeted by 79% of recent malware attacks

android-vulnerabilities

But a recent memo from the U.S. Department of Homeland Security and the Federal Bureau of Investigation seems to contravene Google’s big data findings. The authorities alerted their security personnel to a huge volume of malware attacks drawn by Android mobile devices. According to that memo, 79 percent of hacks have hit Google’s OS, while iOS and Nokia’s Symbian attracted only 0.7 percent and 19 percent, respectively. The FBI and DHS put the blame on Android’s large market share and open source environment.

The agencies identified three common attack techniques employed by hackers. First is the SMS Trojan, which the hacker uses to spam out text messages to premium numbers and collect the charges at the expense of the unsuspecting user. Second is rooting, a sometimes tricky ploy of attackers that logs keystrokes and passwords. Finally, there’s the fake URL disguising as coming from genuine websites such as Google or Facebook only to lure users into installing malicious apps.

Some helpful tips

With the dynamically changing threat landscape, there’s certainly no one-size-fits-all solution to addressing various malware attacks. There are, however, proven ways to secure Android devices from threats, thanks to security researchers:

1. Install only trusted apps from trusted stores.

Most hackers would imitate items from app stores and turn them into apps with varied names. As some stores such as Google Play doesn’t maintain a list of trusted apps, you will be better off doing a background check for an app, including its reviews and ratings, before deciding to download it. And as much as possible, never let third-party stores push items to your device. To make sure you don’t fall for this trap, disable the “Unknown Sources” option in the Settings page.

2. Never use public Wi-Fi networks for viewing sensitive data.

Any public Wi-Fi network is apparently most susceptible to hacking. At any rate, don’t do sensitive transactions under its shade like banking or creating online accounts. If you have to, try a reliable VPN service.

3. Avoid rooting your device.

While rooting gives you freedom to do whatever you wish with your device, there is downside with it. To root a device means to determine its vulnerability, which clears up the way for attackers.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

POLONO PL60Thermal Label Printer Review

DaranEner NEO2000 Power Station Review – A Beast In A Portable Design

Autonomous SmartDesk Junior Review – Kid Standing Desk with Pegboard and Adjustable Height

OKP Life K2P Robot Vacuum Cleaner Review – Who Should Buy this Vacuum?

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • BLUETTI Valentine’s Day Deals for Canada
  • BLUETTI’s Romantic Deals this Valentine – Up to 30% Off
  • Google Is Launching Bard to Fight ChatGPT, Here Is How It Works
  • POLONO PL60Thermal Label Printer Review

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}