Firefox 16, a treat for developers http://t.co/cnd27CzT
Android Market, threat to your smartphone security! Part 2
Earlier in part 1 of the post, we discussed about the threat posed by the newly launched android market to your smart phone. However, I certainly feel that the suspected threat is fictitious, in my view. In this post we will look at what makes this attack groundless!
Firstly if your Google account is hacked, you have already compromised on your security. With Google account, the hacker can do limitless things including purchasing apps from the market. He can play number of tricks like uploading an app to the market, setting a high price of it and later purchasing it with your account. With Google account, he has access to your services like Gmail, Youtube, Orkut, Blogger, Google Calendar AdSense, Google Docs etc. the list continues! Having said that, we cannot say “remote installation” poses any new threat to your security.
To prevent hacking, you must keep strong passwords a combination of characters and numbers. Temper your passwords, slightly, regularly. On a windows system, keep regular check on your system and free it from virus, malwares and spyware; on Linux however, you do not need to worry about virus etc.
Secondly even if we take up the fact that your Google account is hacked it is difficult to find a malicious app in the android market that perfectly follows your desired goals, like spoofing your calls, sending data like contacts, sms files etc to any distant server. For that I must say that Google authorities must take care of the fact that malicious apps are not uploaded to the market.
Thirdly, Okay, further assume, the hacker makes one such malicious app and somehow uploads it to the market. And then with your Google account remotely installs that application to your android phone. You won’t find any confirmation notification, and the app will certainly be downloaded instantly on your phone.
If you are using the phone at that very instant you are lucky! You can easily spot the installation and delete the application from the settings menu. But if you are not using then what happens? Even then, you are not unlucky. It simply impossible to ignore the download icon that appears on the notification bar on the home screen. You will always see a notification for “successful installation”, whenever you turn you turn to your phone.
The application will also appear in the menu, if not specially programmed. Even if you happen to ignore the installation icon in the notification bar and the app icon is hidden in the menu (that is hardly possible), you certainly might be running applications such as “Task killer/Task manger/ App organizer”. Such applications will always detect apps on your phone. Additionally as there is no way to remotely uninstall the application, there is certainly no chance to install and run the app, steal the data and remotely uninstall it.
Therefore we can say, there are so many if and then in this story of attacking on the smartphone via remote installation that it is seems to be somewhat fictitious. Remote installation is not a threat directly, but it can be a security hole.
Like us on Facebook
This week Top Posts
- Top Things to do After Installing Ubuntu 13.04 ‘Raring Ringtail’ : Ubuntu 13.04 Raring Ringtail final is almost out. The final release it scheduled for release on Apri...0 comment(s) |
- Install lamp with 1 command in Ubuntu 12.10, 13.04 Raring Ringtail & LinuxMint13 : Updated: 10/09/2012 :LAMP (Linux, Apache, MySQL and PHP) is an open source Web development platform ...0 comment(s) |
- Howto: Upgrade to Ubuntu 13.04 Raring Ringtail from 12.04, 12,10 | Desktop & Server : Updated 05-04-2013: Ubuntu 13.04 Raring Ringtail will be released Soon, If you have ubuntu 12,10, 12...0 comment(s) |
- Steganography- Hide Your Files Inside An Image in Linux : Nowadays, our personal computer is not only a work tool, it is also our private space where we sto...1 comment(s) |
- Scan Your Home Network With Nmap : Who should read this article? Everyone who is interested in computer security and computer networkin...0 comment(s) |
- How to use Remote Desktop in Ubuntu : Sometimes, we need to access our computer from other locations when we’re not at home and such. This...0 comment(s) |
- Secure File from Removal in Linux and Unix
- How to Install Nginx on FreeBSD 9.x
- Create a Launcher in Ubuntu Using Bash
- Scan Your Home Network With Nmap
- Steganography- Hide Your Files Inside An Image in Linux
- Unix/Linux File Recognition. Did You Know?
- Migrate from MySQL to MariaDB in FreeBSD
- Connect Your Android Galaxy Tablet to Ubuntu via USB
- ElementaryOS Beta 1 and 2 Comparison and Review
- Introduction to the Linux Command Line
Copyright © 2008-2013 Unixmen.com .