Android: The One That Gets All the Attention - Developers, Hackers and YOU

Everybody loves Android

Android is considered one of the best operating systems used in smart phones. This operating system is backed by Google, the number one search engine. The Google Play has become an obsession now, enjoying the biggest number of smart phone apps. Many of them are absolutely free. But what if we tell you that Android is the easiest operating system to hack) and even customized apps such as Gmail can be hacked. Recently it was checked and confirmed that Gmail is one of the top endangered apps, which can be hacked very easily.

This hack is done by disguising malicious software engineered by unfortunately smart people. They created a copy of Gmail app and waited for the victims whoever downloaded that copy to their Android phone. Personal and monetary correspondence would be at the mercy of the programmer. Android devices are vulnerable to hacking that it can be done anywhere any time. For instance, a hacker might have his equipment in his side pocket, all what he has to do in order to hack your Android phone, is to get closer to your device. This literally means that a person that you shake hands with, a passenger who you visit with or even the stranger whose shoulder brushes against yours, can hack all your personal and financial dealings done through Android apps.

It is expert opinion that totally opposite to public opinion, when it comes to security threats, Apple’s iOS is somewhat more immune than Android to hack due to stronger regulations on what they allow to be published in the App Store, according to David Shamath from Times of Israel. Another big problem is Android’s design. Unlike iOS, Android was not designed by a company specializing on mobile operating system. Google is primarily a search engine, and their approach was to design an open-for-all OS. Programmers, developers have much more powers to make the mobile apps work whichever way they want to.

When you read that financial apps for Chase Bank, Amazon or WebMD, big brand names, were found vulnerable to hacking attempts, do you ask how easier it is to hack the rest?

And it doesn't stop there. Advanced cybercriminals can take control of your Android mobile’s mic and camera without needing special equipment or software. This can be done easily through tools, available online for free. This issue has become importance when we realize that Android is the OS used by over 80% of the world’s smart phone users. Do we ask users all to switch to iOS or demand Google to impose a stricter policy on the App Store? The first is unlikely, and the second is absolutely not. Open-source is a good thing and should continue this way. But to continue, we need to deal with current security issues impacting Android users and developers.

Need help or have any question, contact us at support@seacat.mobi and follow us @SeaCatMobi

Photo credit: imcreator


TurboCat.io

Data encryption tool for GDPR

More information


You Might Be Interested in Reading These Articles

The World of Mobile Apps Is Not As Secure As You Think

Mobile app startup companies are notorious for cutting corners. One of the first things that is cut is security. After all, they have the big guys like Comcast, AT&T, and Verizon to protect mobile users, right? Wrong! All the way down the line. TechCrunch's article about security for mobile devices is an interesting theory on the state of security on the Internet. Although, they do hit the mark in the article about how companies fix the problem after the fact of the security breach.

Continue reading ...

startup security

Published on January 13, 2015

Google has introduced new rules about how mobile app developers and companies deal with customer impact on apps across the board. What is it?

The new regulations call for increased transparency with regards to how apps make use of customer data. Developers need to ensure that the way they handle user data - from how they collect it to what it might be used for - is perfectly clear to all users. In Google’s words, developers must “limit the use of the data to the description in the disclosure”. In layman’s terms, this means that data use and privacy policies need to be clearly visible on app descriptions in the Google Play store, and not simply within the app itself.

Continue reading ...

security mobile android

Published on October 10, 2017

Security Is Driving the Adoption of Connected Cars

What seems to be a Sci-Fi movie with “talking” vehicles and “flying” machines has now become a reality. Automotive companies, seeing huge opportunity and wanting to entice their customers, are rushing to produce more car features so drivers can avoid traffic congestion, plan the next route, check the status of the car, find an available parking space, request for road assistance, or notify friends/family members/business contacts of news.

Continue reading ...

mobile IoT security

Published on May 10, 2016