Wednesday, September 23, 2015

Android 7 years: a winding journey to world domination – We Live Security (blog)

seven years does exactly , 23 in September and after much speculation, Google finally revealed his secret project, one that would change the mobile world. Despite the rumors, there was a new smartphone , but something much greater; a completely new operating system in a few years, become the dominant force in the market mobile and mobile devices. His name, of course, was Android .

However, it must be said that all this success was not achieved without some safety problems and slips to outstanding along the way. In fact, some have been most recent, as discussed below.

To begin, think back to 2013, when they released a security hole called Android Master Key. The exploit again vulnerable to almost all devices with this operating sitema, allowing attackers to modify installation packages (Android Application Package – APK). This meant that the systems could not detect changes , so that legitimate applications could be converted into Trojans malicious.

Another big setback came to light a few months ago, in July 2015. bug known as Stagefright could threaten the 95% of all Android devices in the world – in real numbers, almost a thousand millions. Only one MMS sent by a cybercriminal could result in loss of control of the team, but the user not to open or read.

As open source system and one of the most popular, Android also made headlines thanks to increased threats of malware . Recently, a ransomware lock screen detected by ESET as Android / Lockerpin.A type propagated in the wild and could change the PIN code of the infected device. The cybercriminals behind this attack were asking $ 500 to unlock encrypted files, although this was not the first case of ransomware to Android if we remember Simplocker.

Another very recent example was the case reported yesterday, September 22, by researchers at ESET: Android / Mapin is a Trojan games managed to hide in the official Google Play store despite the Bouncer detection system using altered versions of popular applications such as Plants vs. Zombies, Candy Crush , Super Hero Adventure or Subway Surfers. In addition to installing a backdoor the smartphone or tablet of the victim, Mapin uses a timer to delay the implementation of payload .

With the help of this malicious code, an attacker can taking control device, make it part of a botnet and avoid detection ; thus, any foreign comporamiento attributed to the downloaded game.

The alarming of Android / Mapin is the fact that all of this was found in apps available on the official store Google Play . According to telemetry ESET, most infections were detected in India, constituting 73 percent of the total.

As the short but remarkable life of Android documents, mobile operating system most used still has some weaknesses and remains an attractive target for cybercriminals. That’s the problem with devices and popular systems: attract the attention of attackers as well as the users and intrepid developers

So if you want to celebrate 7 years of Android, follow these seven rules. to help you be sure:

    1. Update always the OS and apps on your device to the latest version available
    2. Make backup ( backup ) of all data on your computer, or at least the most valuable. How do you know what? Access this infographic to see if you should make a backup copy of a file or
    3. Use security solutions date provided by an organization with high reputation
    4. Try to use only the official store Google Play, where the odds of becoming infected with malware are lower (although as evidenced by Android / Mapin , the Applications are reviewed by Google itself and sometimes by security vendors)
    5. Use the Screen Lock and remember that the pattern can be easily guessed and less secure than a PIN, and that a password is your best choice
    6. Figure the contents of your device
    7. Try to avoid “rooting” device, although it is a tempting option

For more safety practices that protect your computer, go to the Security Guide Android .

Author Editor, ESET

LikeTweet

No comments:

Post a Comment