Skip to main content

Android Security


Android Security
With the arrival of search giant, Google in mobile phone market the Android operating system for mobile devices was introduced. In this article we would discuss the security of android operating system. We would see what threats an android based device faces, what are the vulnerabilities and what measures could be taken to make your android based device safer and secure.
Android is an open source operating system for mobile devices. Since its inception it had became hugely popular and is currently the second most used operating system for mobile devices after Nokia’s symbian. The android market is supported by a huge community of developers writing applications for android based devices. Upon its release, android security was considered to be invincible and there was a debate of why to use resource hogging and battery consuming security softwares when the android operating system itself could not be corrupted. But with the passage of time the android security was compromised. And the biggest security threat that emerged was the android market place applications. Although Google tries its best to ensure all the applications developed for android based devices are secure and safe, the hackers and malicious software always find a way to the devices. With billions of users, this made the android security a burning issue.
Apart from the risks and security issues that are always associated with a mobile device, the biggest security threat that android based mobile devices face is the threats from applications. The applications developed for an android based device can access your private data such as contacts, notes and other personal information stored on your device. A carefully engineering application can use the sensors, camera and microphone of android phone turning your android based device into a mini spy cam. So it is very important for android users to be careful while downloading and installing applications. The best thing to do is never download and install an application until and unless you need it critically. Even if you are going to download and install and application you must verify its developer and ensure that it had passed the Google security checks and quality assurance. Unlike the apple’s Iphone and Ipad, Android based devices do not have a standard version of operating system. It is upto your service provider to make the latest update of android available to you. The inability of a centralized update platform make the android based mobile devices more vulnerable to security threats and exploits.  To counter the threat of applications you must set the permissions for these applications. You can view the information that your applications are currently accessing by visiting the Android market, similar to the applications store from your android based mobile device. From here you can select the applications you want to view. After selecting the applications go to security under the menu tab. Here you would be shown all the applications that you have selected earlier. You will be shown which information these applications are accessing. Now you can disable or uninstall the applications that are exhibiting suspicious behavior or accessing your private information that you want to hide. You can also consult the developer documentation to get help on applications. Google allows the users of android based mobile devices to comment on applications that they are using. You must take advantage of these comments, always read the comments of applications that you are using or planning to download and install. If you find anything suspicious in more than 5 comments on an android application, do not download or install it. If your are already using it then check what information it is accessing, if it seems suspicious then disable or uninstall that application. You can also use the ‘app protector’ software to lock the applications on android phone. You can also set a password. If you try to access or launch a locked application it would ask you to enter password. The open source environment of android operating system lets you modify the license library. Though it wont stop an attack, it would make it difficult for muggers to disband the code. The Afirewall is another innovative security application for android mobiles. Afire is a free version of firewall for android based devices. With Afirewall you can block calls for specific numbers.
Another security service for android based mobiles is the DroidHunter. It contains an antivirus program, an intrusion detecting system, incoming alerts and online management system. It is very much like a desktop based antivirus program, apart from the fact that it is sensitive only to android based threats. The droidhunter can also be used to locate your lost or stolen android mobile phone.
After discussing the threats android mobile faces from application now lets move on to more traditional or conventional threats that your android mobile faces.
Prevent unauthorized use of your android mobile. The easiest way to accomplish this task is by never leaving your android mobile alone. Always keep it with you or at a safe location. Use the screen lock feature to protect your device even if it gets lost or is stolen. The android operating system lets you use three methods for screen lock. The conventional passcode mehod in which you specify a combination of letters and numbers to unlock your android phone.  You can also use a specific pattern of drawing or signature to unlock your android phone. The third option is to use a biometric lock, you can lock and unlock your android mobile with your fingerprint.  The latitude based service of android mobile is used to track your location but if you want increased privacy and security then you must disable the location detection and tracking system in your android mobile. To perform this go to latitude settings and disable the detect your location option.
If you want to connect your android phone to a wifi network or any other device through Bluetooth, always make sure that the network is secure or the device or network do not pose a seriouis security risk. If you do not need connectivity then disable the Bluetooth of your android mobile.
If you are using your android mobile for browsing or surfing the internet then there are a number of browser based settings to increase the security of your device. Make sure you have got the right options turned on. In the browser security settings you can block pop ups, enable or disable java script, enable or disable plug ins, clear browsing history and check your cookies settings. Its important for android users to get themselves familiarized with these settings and adjust them according to their usage habits. 


Comments

Popular posts from this blog

Ipad apps: AppStart Review

AppStart For iPad Review Free for a limited time only , AppStart for iPad is a terrific app by the folks over at  AppAdvice.com  that’s meant to serve as a starter guide for new iPad users and owners. The promotion is only available for a limited time as customers flock to pick up their iPad 2s this week. Whether you’ve had your iPad since launch day or you just picked one up, AppStart For iPad is a detailed and comprehensive guide for the most popular and useful ways to utilize your iPad in addition to recommending a few apps to get your feet wet. When you first open the app, the home screen is displayed in a clean grid of buttons for you to tap-in and find out everything there is to do with the iPad. Each grid-box allows you to open up a mini-guide for how you can use your iPad as an eReader, home theater, radio, nightstand, magazine, or social media hub. Within each mini-guide, the folks over at App-Advice also throw in their suggestions for both free and paid apps that re...

Ipad 2 Accesories

Zagg have done it again and released what we are excited to say is the seasons MUST HAVE iPad accessory: The  ZAGGmate iPad case with keyboard . It’s not often that we get entirely blown away by an accessory for the iPad, but this one has left us shell shocked and in awe. The perfect compliment to your iPad, this is the first iPad keyboard case combo that we have seen yet that has done it right. In fact, it’s the best bluetooth keyboard we’ve seen to date as well! It’s so right and so perfect that we already wonder how we ever used our iPad without it! Check out the review below… ZAGGmate with Keyboard The iPad’s New Best Friend Our first impression of the ZAGGmate was: “Where’s the rest of it?” This iPad case is unlike anything else we’ve seen on the market to date and the designers at Zagg worked hard to literally rethink what an iPad case could be. This is an iPad case that doesn’t cover the whole iPad, but rather just covers the iPad’s screen, and leaves the back of the tablet...

Ipad 2 Apps: Skyfire Web browser Review

Ipad 2 Apps: Skyfire Web browser Review Skyfire for the iPad made headlines when it was first released, due to its ability to play Flash videos on a device previously void of this popular technology. Users flocked to the App Store, eager to drop five bucks for the chance to view their favorite clips, shows, and movies on their iPad. Not only did the browser play these videos, but the integrated video compression saved a significant amount of bandwidth for people on a restricted data plan. The initial excitement wore off quickly, though, as complaints were rampant about many sites not playing videos as expected. Since its inception Skyfire has certainly improved in this area, now claiming support for over 200,000 websites containing Flash. The dissenters will always be there as not every Flash video on the Web will be playable, even if the developers at Skype Labs remain diligent. Some of the backlash is warranted to a certain extent. If I paid $4.99 with the intent of viewi...