HOT LINE 1654

Alerts

How safe are your Android devices?

08 Dec 2013

The analysis  revealed that  Android phones and tablets were the most widely used technical devices across the country. Are your Android devices  safe enough?

security

Since its initial  inception, this system  has highly improved and spread  .However, the main weakness  of this system  is the security  issue.

As Android is an open source operating  system, apps for this system    may  be conveniently  installed. Taking the advantage of  this  vulnerability, malicious users  create  malwares which  make android  systems infect with viruses.

How should the users deal with the spread of these softwares as a result of   Google 's  lack of control over the softwares  loaded  to Play Market ?

For  this reason, the users should have information on Android viruses and its working principles. For this purpose  the following information is about  viruses.

Trojan horse's power

The power of Android Trojans  is very effective.

  • This is  the most improved   Trojan horses which  record  your phone calls. CA security researchers discovered that this Trojan horse stores  your phone calls in .amr format and sends to the Server while you connect  to the Internet. The  data  stolen  by Trojans can be used to blackmail  you.
  • In addition, there  are  some  Trojan  horses  which  may  steal  IMEI  number of your  mobile phone  and block  it  making  unusable.
  • There are also Trojans   which  send  unauthorized messages.

In short, all your  information is  under their control. Its main reason  is Android' s permissions.  When you install an app, you're presented with a list of permissions that application is declaring. The detail  page in the App centre displays  information  about which permissions are given  to App.  These important  permissions allow  the Android Trojan app to  access  to  all data  on  your cell phone. You should  read all permission requests carefully for Android safe use. For example , why does  this app  require  the permission? Download and install only apps that you trust. Thus, you should read thepermission requests while  you install the  apps. You should choose   apps  carefully which you are downloading.

trojan

Android Counterclank

When you  download apps from Play Market   you should pay attention  comments  and  reviews  about the app, as well as,  the name of company and its popularity. For example, If  the popular game  Counter Strike  is built  for Android  platform you will see information  about it  on the  other  websites .It is not recommended  to download this kind of  apps and games which hide  behind  famous companies. Because you can  download this kind of malwares to  your  phone in this way. If you  are  careful  with  these  points  you will secure   your phone. In addition, information on Android security apps is given below.

 

 

Antivirus Free:

secure

 

Antivirus softwares  are also important for mobile phones. As you know, Antivirus Free is  released as free  software. In addition, Lookout Security is also recommended software.  It is possible to pinpoint the  location  of your phone via  this  software when your phone is stolen.

The first step  is to disconnect from the Internet if  your android  devices  are infected with viruses. In fact,  Internet access  keeps  Trojans active. Turn off your  phones if  it still connects to the Internet . It should be noted that there  are also  Trojan viruses  which  copies itself  to the root folder. Although you copy  the  memory card  and reset  your phone to the factory settings,  Trojans  will   stay  in the root folder. Therefore, the  best  solution  is  formatting  mobile  phone. In addition,  memory card should be  formatted for security.