Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Keep an Eye on Your Android Apps

Adoption of Android, an open source mobile device platform, is growing and millions of Android devices are being put into use every month, many of those with access to corporate networks. While many can argue that users have been waiting to upgrade to Apple’s latest iPhone 4 (launching this week), in the first part of 2010 Android based smartphones outsold iPhones for first time since its inception.

Adoption of Android, an open source mobile device platform, is growing and millions of Android devices are being put into use every month, many of those with access to corporate networks. While many can argue that users have been waiting to upgrade to Apple’s latest iPhone 4 (launching this week), in the first part of 2010 Android based smartphones outsold iPhones for first time since its inception.

SMobile Systems, a provider security software for mobile devices, analyzed over 48,000 applications currently available on the Android market and discovered some scary facts. SMobile’s Global Threat Center discovered that:Securing Android Devices

20 percent of applications in the Android market grant a third party application access to private or sensitive information that an attacker could use for malicious purposes, such as Identity Theft, mobile banking fraud and corporate espionage; 5 percent of applications have the ability to place a call to any number, without requiring user intervention;

Dozens of applications have the identical type of access to sensitive information as known spyware

2 percent of market submissions can allow an application to send unknown premium SMS messages without user intervention.

“The use of both company and employee-owned smartphones in the enterprise can have a dramatic and positive impact to productivity and efficiency. Concurrently, enterprises need to realize and accept that these mobile computing devices are performing the same functions as traditional computers and require the same types of Anti-Malware and endpoint security management and protection as their PC counterparts,” Daniel V. Hoffman, Chief Technology Officer for SMobile Systems tells SecurityWeek.

“There are individuals and organizations out there right now, developing malicious code designed to capture your most personal information and use it to their advantage,” said Neil Book, Chief Executive Officer of SMobile Systems.

The rapid increase in mobile devices accessing enterprise networks has led to an increase in the associated risks and breaches of security in the enterprise and it’s critical that companies increase efforts to protect mobile devices from malware, spyware and other threats.

Advertisement. Scroll to continue reading.

Update 6/24/10 11:06AM EST: Headline changed to reflect tone

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Cybercrime

A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.