Google hit the
goldmines with its development of Android. Seeing as this is the choice
operating system on no less than 2 billion devices out there
today, that is no overstatement.
However, the
Android market is that big means it is a huge goldmine for hackers too. This is
why the average Android user should be put on alert and always make a move to
ensure their safety and security at all times.
If you’ve also got
an Android device on your hands, here are some vulnerabilities you could be exposed
to – and how to nip them all in the bud.
Issue #1 – System Vulnerabilities
No matter how
great a piece of software is, there will be some bugs and leaks in the code.
This should be
expected for a long body of code that will guide the entire operations of a
device. That is not to mention the fact that this single canopy of code was
developed by a team of coders, and there could be human errors from each and
every part of the board.
When a big company
like Google is developing, they try to make sure these issues are as minimal as
possible. Even at that, though, it happens.
What to Do
-
System
patches will always be sent out to fix issues, in the form of software updates.
Google now publishes these security fixes once a month. Ensure you always
download and install them as soon as you get them so you are always running on
latest security protocols
-
Purchase
your units from a manufacturer who has a track record of sending out security
fixes. Do your research into this before committing to buying at all
-
Download
and install system upgrade packs whenever they become available too.
Issue #2 – App Vulnerabilities
Applications are
yet another way by which hackers could gain access to your data and
information. The interesting thing here is that app vulnerabilities can happen
in a variety of ways.
The first and most
common stems from downloading apps from sources other than the Google Play
Store. Since they were never on the store, there is a risk that they contain
malicious codes that have not been screened out by Google’s engineering and
development team.
On the other hand,
even trusted apps on the Play Store can be compromised for the wrong reasons.
Even WhatsApp was
recently a target of such, so the possibility should not be
ruled out
What to Do
-
Never
sideload apps. If you are not getting the app through the official Play Store,
you are better off not getting the app at all
-
Download
app updates as soon as they are out. They could be there to fix patches in the
system (like in the case of WhatsApp mentioned above)
Issue #3 – Public Wi-Fi connections
You must be
wondering what this has to do with anything.
While public Wi-Fi
networks bring the sure convenience of browsing the web without incurring data
costs, they might be costing you more than you know.
Due to their lack
of encryption, these networks have become a haven for hackers to pounce on. All
the way from installing malware on the network (which gets into your device
without your knowledge) to perpetrating man-in-the-middle attacks, there seems
to be no end to how hackers can take minimal to complete control of your units
this way.
What to Do
-
The most
obvious answer is to stop connecting to public Wi-Fi networks altogether. They
are not healthy for your data privacy
-
If you must
connect to them, consider having a VPN installed on your Android phone to keep your connection encrypted.
Issue #4 – App Permissions
One thing that
Google improved on the Android software from the v5 Lollipop is app
permissions, and for good reasons too.
There was a time
when apps could set the permissions they required to work on your device, and
you had to agree to them. Now, you can edit the apps to have just the
permissions you need.
That is helpful in
ensuring an app doesn’t have too much access to your personal life and data
than needed.
-
Check all
your apps and see that they have appropriate permissions to work, and no more.
For example, a messaging app might require access to your contacts, but that is
not same for a third-party camera app.
-
If an app
fails to work unless you give it certain permissions (which it doesn’t need),
uninstall it in favor of others. Trust us: The Play Store is full of
alternatives than allowing yourself to be held ransom by one app.
Credits to @TechWarn.com
No comments:
Post a Comment