ADs

ANDROID Popular And Cybercriminals

ANDROID  Popular And Cybercriminals

Free running Google's Android open source software runs on the Linux 2.6 kernel and ranked first among the smartphone operating systems - it accounts for 52.5% of the world market. 
In the basic configuration Android all applications run in the so-called sandboxes (Sandbox), ie in closed environments. Therefore, the application can not modify system files and security risks of the whole system are insignificant. The main source of threat when using this operating system is that many devices on the Android platform is pretty easy to get full control over the device, using the existing gaps user is able to acquire all the superuser (Root), which is inherited from the Android Linux.

In such "rutirovannyh" devices superusers can do anything you like, for example, to install the program with features that are not available to ordinary users. Since the Root systems Linux / Unix traditionally has unlimited rights, this fact can use malware. So I wish to get the right Root for your smartphone should all think carefully and carefully apply to the verification of applications for which these rights are a prerequisite. In corporate networks should act unconditional right: a complete ban on the use of devices on the platform Android, which enable the rule Root. 
As for other threats, the experts of the companies Lookout and Kaspersky generally unanimous: the first half of 2012, the number of threats to mobile applications on the Android platform has increased significantly and this growth will continue. In many cases, we are talking about specific smartphone attacks associated with sending SMS. Unfortunately, both administrators and users themselves often underestimate the risks associated with the presence of such breaches in security features .
According to most experts, users of mobile devices threaten the following hazards: 
Mobile pickpockets (fraud by SMS or calls). Such "pickpocketing" are possible thanks to the fact that many mobile phone supports making payments via SMS, as a kind of Android OS by default there are no means of control over such data. Troyan Ggtracker implements one of the first such attack on a system Android; 

All kinds of botnets. Many malicious applications promoted that botnets were involved in a number of mobile devices. Examples include Trojan Geinimi and sufficiently known malicious code Droiddream, which, unfortunately, was found in some applications from the store Android Play Store.

Each device on the Android platform should be present software testing smartphone for possible gaps and provides additional protection. The company's decision Lookout, designed for systems based on Android 2.3.6.

Talha

All The Information On post is Fully Authentic.
Thanks For Visiting Our Blog.

 

Copyright @ 2014 Android Editors.

Designed by Templateism