{"id":4916,"date":"2013-10-10T10:47:31","date_gmt":"2013-10-10T14:47:31","guid":{"rendered":"http:\/\/www.techwalls.com\/?p=4916"},"modified":"2013-10-10T10:47:31","modified_gmt":"2013-10-10T14:47:31","slug":"how-safe-is-android-device","status":"publish","type":"post","link":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/","title":{"rendered":"How Safe is Your Android Device?"},"content":{"rendered":"<p>As though to brush off substantiated reports showing Android\u2019s vulnerability to malware attacks, Google\u2019s security chief Adrian Ludwig recently presented a report that claims the operating system\u2019s security infrastructure successfully scanned 99.99 percent of app downloads and installations.<!--more--><\/p>\n<p>Ludwig raised valid points for all that. He said Google managed to thwart attacks by locking down Android at the device level, meaning its security model has isolated almost every kind of malware that Windows hatched over the years. Verify Apps is at the core of Android&#8217;s security mechanisms. The software examines an app before it is installed and weighs the results against Google\u2019s data sets of malware information to notify users about potential risks.<\/p>\n<p>The search giant has faith in warnings as the most forceful check to malware and that strategy has been around for more than a year now.<\/p>\n<h2>Android targeted by 79% of recent malware attacks<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4920\" alt=\"android-vulnerabilities\" src=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg\" width=\"512\" height=\"322\" srcset=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg 512w, https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities-300x189.jpg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>But a recent memo from the U.S. Department of Homeland Security and the Federal Bureau of Investigation seems to contravene Google\u2019s big data findings. The authorities alerted their security personnel to a huge volume of malware attacks drawn by Android mobile devices. According to that memo, 79 percent of hacks have hit Google\u2019s OS, while iOS and Nokia\u2019s Symbian attracted only 0.7 percent and 19 percent, respectively. The FBI and DHS put the blame on Android\u2019s large market share and open source environment.<\/p>\n<p>The agencies identified three common attack techniques employed by hackers. First is the SMS Trojan, which the hacker uses to spam out text messages to premium numbers and collect the charges at the expense of the unsuspecting user. Second is rooting, a sometimes tricky ploy of attackers that logs keystrokes and passwords. Finally, there\u2019s the fake URL disguising as coming from genuine websites such as Google or Facebook only to lure users into installing malicious apps.<\/p>\n<h2>Some helpful tips<\/h2>\n<p>With the dynamically changing threat landscape, there\u2019s certainly no one-size-fits-all solution to addressing various malware attacks.\u00a0There are, however, proven ways to secure Android devices from threats, thanks to security researchers:<\/p>\n<h3>1. Install only trusted apps from trusted stores.<\/h3>\n<p>Most hackers would imitate items from app stores and turn them into apps with varied names. As some stores such as Google Play doesn\u2019t maintain a list of trusted apps, you will be better off doing a background check for an app, including its reviews and ratings, before deciding to download it. And\u00a0as much as possible, never let third-party stores push items to your device. To make sure you don\u2019t fall for this trap, disable the \u201cUnknown Sources\u201d option in the Settings page.<\/p>\n<h3>2. Never use public Wi-Fi networks for viewing sensitive data.<\/h3>\n<p>Any public Wi-Fi network is apparently most susceptible to hacking. At any rate, don\u2019t do sensitive transactions under its shade like banking or creating online accounts. If you have to, try a <a title=\"Private Internet Access\" href=\"https:\/\/www.techwalls.com\/private-internet-access-review-safe-vpn-service\/\" target=\"_blank\">reliable VPN service<\/a>.<\/p>\n<h3>3. Avoid rooting your device.<\/h3>\n<p>While rooting gives you freedom to do whatever you wish with your device, there is downside with it. To root a device means to determine its vulnerability, which clears up the way for attackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As though to brush off substantiated reports showing Android\u2019s vulnerability to malware attacks, Google\u2019s security chief Adrian Ludwig recently presented a report that claims the operating system\u2019s security infrastructure successfully scanned 99.99 percent of app downloads and installations.<\/p>\n","protected":false},"author":89,"featured_media":4920,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1445,1146],"tags":[31,1147,387],"class_list":{"0":"post-4916","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-featured","8":"category-guide","9":"tag-android","10":"tag-guide-2","11":"tag-security","12":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Safe is Your Android Device?<\/title>\n<meta name=\"description\" content=\"The U.S. Department of Homeland Security and FBI alerted their security personnel to a huge volume of malware attacks drawn by Android mobile devices. Is Android safe?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Authors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/\",\"url\":\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/\",\"name\":\"How Safe is Your Android Device?\",\"isPartOf\":{\"@id\":\"https:\/\/www.techwalls.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg\",\"datePublished\":\"2013-10-10T14:47:31+00:00\",\"dateModified\":\"2013-10-10T14:47:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\"},\"description\":\"The U.S. Department of Homeland Security and FBI alerted their security personnel to a huge volume of malware attacks drawn by Android mobile devices. Is Android safe?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#primaryimage\",\"url\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg\",\"contentUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg\",\"width\":512,\"height\":322},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techwalls.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Featured\",\"item\":\"https:\/\/www.techwalls.com\/featured\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Safe is Your Android Device?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techwalls.com\/#website\",\"url\":\"https:\/\/www.techwalls.com\/\",\"name\":\"TechWalls\",\"description\":\"Technology News | Gadget Reviews | Tutorials\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techwalls.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\",\"name\":\"Guest Authors\",\"url\":\"https:\/\/www.techwalls.com\/author\/guestauthor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Safe is Your Android Device?","description":"The U.S. Department of Homeland Security and FBI alerted their security personnel to a huge volume of malware attacks drawn by Android mobile devices. Is Android safe?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/","twitter_misc":{"Written by":"Guest Authors","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/","url":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/","name":"How Safe is Your Android Device?","isPartOf":{"@id":"https:\/\/www.techwalls.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#primaryimage"},"image":{"@id":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg","datePublished":"2013-10-10T14:47:31+00:00","dateModified":"2013-10-10T14:47:31+00:00","author":{"@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84"},"description":"The U.S. Department of Homeland Security and FBI alerted their security personnel to a huge volume of malware attacks drawn by Android mobile devices. Is Android safe?","breadcrumb":{"@id":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techwalls.com\/how-safe-is-android-device\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#primaryimage","url":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg","contentUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2013\/10\/android-vulnerabilities.jpg","width":512,"height":322},{"@type":"BreadcrumbList","@id":"https:\/\/www.techwalls.com\/how-safe-is-android-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techwalls.com\/"},{"@type":"ListItem","position":2,"name":"Featured","item":"https:\/\/www.techwalls.com\/featured\/"},{"@type":"ListItem","position":3,"name":"How Safe is Your Android Device?"}]},{"@type":"WebSite","@id":"https:\/\/www.techwalls.com\/#website","url":"https:\/\/www.techwalls.com\/","name":"TechWalls","description":"Technology News | Gadget Reviews | Tutorials","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techwalls.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84","name":"Guest Authors","url":"https:\/\/www.techwalls.com\/author\/guestauthor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/4916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/comments?post=4916"}],"version-history":[{"count":0,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/4916\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media\/4920"}],"wp:attachment":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media?parent=4916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/categories?post=4916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/tags?post=4916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}