Many Android apps pose privacy threat, says security vendor
IDG News Service - As many as 20% of applications on Android Market let third parties access private or sensitive information, according to a report from security vendor SMobile Systems.
SMobile, which develops software for protecting smartphones, has performed an analysis of over 48,000 applications available on Android Market, and looked at what permissions are granted to the application by the mobile operating system.
The permissions -- which allow applications to do a multitude of things, including initiating a phone call, reading SMS (Short Message Service) messages or identifying the phone's location -- are there to help people develop useful applications. But applications might also access those kinds of personal data for nefarious purposes, according to SMobile.
In addition, some 5% of Android apps can be used to place a call to any number, and 2% of applications can send an SMS to an unknown premium number, in both cases without user involvement.
A majority of these applications were developed with the best of intentions and the user data will likely not be compromised, according to SMobile. But there have been cases of the opposite: A bank phishing application that was published by an author by the name of Droid09 was found and removed from Android Market, it said.
Android's security model requires that applications declare the permissions they will be using prior to installation by the user. An informed user can use these declarations to decide if they want to install an application or not, according to SMobile. However, the fact remains that there is no means available for a user to know for sure that the application they just downloaded is doing only what the user sees it doing, it said.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Privacy White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!