Android Malware

In: Computers and Technology

Submitted By kennyo112
Words 803
Pages 4
As more and more people continue to adopt mobile devices, they increasingly use them to store and access a variety of personal information. In addition, my companies are utilizing mobile devices to increase productivity and collaboration among employees. As of December 2013 Google’s Android Operation System was the top smart phone platform with 52.5% of the market share ("iOS Continues Gaining U.S. Smartphone Share"). As these numbers continue to grow cybercriminals have taken notice and there has been an increase in the number of malware programs developed for the Android operating system. These malware programs can present a variety of threats from allowing criminals access to important personal information to intercepting private text messages and emails as well as even allowing someone to remotely turn on the phone’s mic. These threats can present a problem to both private individuals and businesses alike. It is important that steps be taken to prevent cybercriminals from accessing this information by preventing malware from being installed on these devices. If I was responsible for strengthening this area of IT security, I would recommend several steps. For starters, I would provide education to personal and business users to instruct them on the proper software to have installed in order to protect their devices as well as things to look out for and avoid. For businesses, I would recommend they employ strict guidelines for users of company equipment and dictate polices for users that bring their own devices.
An important step in protecting against Android malware is educating device owners. According to research firm IDC only 5 percent of smartphones and tablets have some sort of antivirus program installed (Graziano). Users need to understand that smartphones are less “phones” and more tiny computers and that they need to be properly protected with software…...

Similar Documents

Android

...ANDROID VERSION ICE CREAM SANDWICH WHAT IS ANDROID Let me first give you an intro about Android. As we all know it is an operating system and platform for mobile devices. It is an open source product. Android is a ground-breaking innovation from the scientists down at Google Labs. It is touted as the next big revolution in the mobile phone Operating System play ground. The reason why Android Operating System is so famous amongst them asses of today is because of its flexibility and ease of resources. Android Inc, was founded in Palo Alto, California, United States Developed by Andy Rubin, Rich Miner, Nick Sears and Cris White - October 2003 Google acquired Android Inc. - August 2005 The Open Handset Allience, a consortium of several companies was formed - November 2007 Android Beta SDK Realeased - November 2007 VERSIONS OF ANDROID Google has always sought for fun in everything they do and Android is no exception to it. The versions of Android are named after mouth watering desserts. Platform | Codename | Release Date | Android | Beta | November 5, 2007 | Android 1.0 | | September 23, 2008 | Android 1.1 | | February 9, 2009 | Android 1.5 | Cupcake | April 30, 2009 | Android 1.6 | Donut | September 15, 2009 | Android 2.1 | Éclair | October 26, 2009 | Android 2.2 | Android 2.2 | May 20, 2010 | Android 2.3 | Gingerbread | December 6, 2010 | Android 3.0 | Honeycomb | February 22, 2011 | Android 4.0 | Ice Cream Sandwich | October......

Words: 2278 - Pages: 10

Android

...What is android? • Android is a Linux-based operating system designed primarily for touchscreen mobile devices such as smartphones and tablet computers. It is currently developed by Google in conjunction with the Open Handset Alliance. Initially developed by Android Inc, whom Google financially backed and later purchased in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance, a consortium of 86 hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. 1. History Androids? • Android beta i. The Android beta was released on 5 November 2007, while the software developer's kit (SDK) was released on 12 November 2007. • Android 1.0 i. Android 1.0, the first commercial version of the software, was released on 23 September 2008. The first Android device, the HTC Dream. • Android 1.1 i. On 9 February 2009, the Android 1.1 update was released, initially for the HTC Dream only. Android 1.1 was known as "Petit Four" internally, though this name was not used officially. The update resolved bugs, changed the API and added a number of features. • Android 1.5 Cupcake i. On 30 April 2009, the Android 1.5 update was released, based on Linux kernel 2.6.27. This was the first release to officially use a name based on a dessert ("Cupcake"), a theme which would be used for all releases......

Words: 712 - Pages: 3

Android

...| AndroidMobile Operating System | Jamie Caves | 4/1/13 | COM156 | | | AndroidMobile Operating System | Jamie Caves | 4/1/13 | COM156 | | With over 400 million Android devices activated to date, it is by far the most popular mobile operating system in use today. The Android OS is one of the most used worldwide, and its open source permits unlimited customization by anyone with the desire to learn it and use it. I have done quite a bit of research on it in the past for my personal use and have learned just a small portion of just how open and customizable Android can be, whether it be personal customization or productivity of the software. Android has helped to change the way we work, socialize, and entertain ourselves. The majority of social media users now use their smartphones, with Android software and applications, to access and post to various sites like Facebook, Twitter, and Instagram where people like to post what they are currently eating. Joking aside, Android has helped to push mobile technology farther than ever before. The Android mobile operating system is currently the most widely used and the most popular for smartphones and tablets today. Android has a distinct advantage over its competition in that it is available on a myriad of devices from nearly all the smartphone and tablet manufacturers today like Samsung, LG, Motorola, HTC, and many others whereas their closest competitors Apple and......

Words: 1407 - Pages: 6

Android

...RTL improvements Android 4.3 includes RTL performance enhancements and broader RTL support across framework UI widgets, including ProgressBar/Spinner and ExpandableListView. More debugging information visible through the uiautomatorviewer tool. In addition, more system UI components are now RTL aware, such as notifications, navigation bar and the Action Bar. To provide a better systemwide experience in RTL scripts, more default system apps now support RTL layouts, including Launcher, Quick Settings, Phone, People, SetupWizard, Clock, Downloads, and more. Utilities for localization Pseudo-locales make it easier to test your app's localization. Android 4.3 also includes new utilities and APIs for creating better RTL strings and testing your localized UIs. A new BidiFormatter provides a set of simple APIs for wrapping Unicode strings so that you can fine-tune your text rendering in RTL scripts. To let you use this utility more broadly in your apps, the BidiFormatter APIs are also now available for earlier platform versions through the Support Package in the Android SDK. To assist you with managing date formatting across locales, Android 4.3 includes a new getBestDateTimePattern() method that automatically generates the best possible localized form of a Unicode UTS date for a locale that you specify. It’s a convenient way to provide a more localized experience for your users. To help you test your app more easily in other locales, Android 4.3 introduces......

Words: 494 - Pages: 2

Malware

...MALWARE PROJECT ROOT KIT A root kit refers to a specialized set of programs normally used by crackers in order to subvert control of an operating system of a computer system. A rootkit enables breaking in security of a computer system and gaining root access for various operating systems such as Unix, Linux, Solaris, Microsoft Windows, Mac OS etc. A root kit is a set of tools used by a hacker to infiltrate a computer system without the knowledge or consent of the system's owner. These tools help the intruder gain access to the system in order to perform malicious activities at a later date without being detected. WHAT MAKES IT DIFFERENT FROM A VIRUS? Most often, rootkits are used to control and not to destroy. Of course, this control could be used to delete data files, but it can also be used for more nefarious purposes. More importantly, rootkits run at the same privilege levels as most antivirus programs. This makes them that much harder to remove as the computer cannot decide on which program has a greater authority to shut down the other. DETECTING AND PREVENTING ROOTKITS One issue with rootkits is that they are constantly updated; even with all sorts of computer security protocols programmed every day to specifically eliminate rootkits, people who program them continue to develop and update the rootkit, or make new ones. It doesn’t mean, though, that they cannot be prevented. Methods through which RootKits can be prevented are: * Anti-virus software.......

Words: 1362 - Pages: 6

Android

...Critique #4 Android Insecurity Source: http://www.sciencedirect.com/science/article/pii/S1353485811701040# Generally speaking, almost every issue comes up with double-edged sword. In today’s society, Android operating system is also no exception. Along with its open source code released by Google under the Apache license, the security issue is becoming more and more significant and emergency. Whether or not the Android operating system is designed with any intrinsic security initially, from this article’s perspective, the author may state a negative answer of Android as a failure both the operating system and the hardware. We can get start from an overview about what the author listed through the beginning to end in the article. At first, the initial reason and environment about why Android developed appear to us along with the so called wrong policy-atypia at the beginning in the development cycle. It’s precisely because these non-mainstreams such as true multi-tasking that cause the current insecurity issues including multifariously malicious malware, e.g. Trojan-SMS, Fake Player, Droid Dream malware and so on. Meanwhile, the author listed the cause for concern, and also some tests on Android from the analyst view to test the security. There are two points in the article leave me a deep impression. The first one is a series of atypical and nonstandard design of Android. To come the first, its main kernel is just a branch of mainstream in Linux research and......

Words: 598 - Pages: 3

Android

...Essay on “Google Android OS vs. Apple iOS” The competition between Google Android and Apple iOSis one of the most talked after wars in mobile gadget platforms. The Google Android platform is increasingly becoming dominant in the smartphones and tablets market. Nokia, a once leading company in the mobile phone market is slowly entering the smartphone market with a new range of Lumia smartphones powered by Windows 8 mobile as it phases out its range of Symbian powered smartphones. Equally, Motorola Mobility is trying to gain a share of the market by increasing its product portfolio of smartphones in the Droid family. The Android Operating System powers the Droid range of smartphones. Samsung is by far the largest mobile manufacturing company in the world with a full range of Android powered smartphones in the Galaxy family. The recent entry of the Samsung Galaxy SIII heightened the competitive advantage of the Android Software Platform based on the Android 4.0 (Ice Cream Sandwich) software. With HTC,Blackberry OS, and Microsoft Mobile as a distant competitors, the war is clearly not between mobile phone manufacturers but the war is between software manufacturers, and in this case,Apple iOS and Google Android (Katie, 2012). Currently, the competition between Apple iOS and Google Android is so close such that it becomes difficult to tell the superior operating system (Ian, 2011). Undeniably, each mobile platform has its strengths and weaknesses. Advantages of Android OS over......

Words: 1828 - Pages: 8

Android

...Android by 2012 A study on present and future of Google's Android Dot Com Infoway - Position Paper- www.dotcominfoway.com Android by 2012 A study on present and future of Google's Android S.No 1 2 3 4 5 6 7 8 9 10 11 12 13 Contents Executive Summary The Android Tale Why Google Android Android: Breaking the 'Walled Gardens' What's so different in Android Advantages of Dalvik Virtual machines Android: A promising haven for app developers and OEMs? Market Predictions Final Comments About Dot Com Infoway Sources Interesting Android links Glossary Dot Com Infoway - Position Paper- www.dotcominfoway.com Executive Summary: This paper attempts to study the present conditions of Android OS and unveils the predicted future market possibilities for Android, based on results from several research firms, using current market statistics and popularity among developers and end-users. All the flimflams and excitement about the costlier iphones and Blackberrys are vanishing, after the arrival of the most anticipated, open source mobile operating system, the Google Android, which is fated to turn the industry upside down. Despite the growth and popularity for iPhones and Blackberrys, it is predicted that, Android will make a history in sales and on acquiring the market share, slicing down the markets of both Symbians and iPhones. This paper will elaborately examine the predictions about the future of Android phones, considering the present facts and reasons. The Android......

Words: 2607 - Pages: 11

What Is Malware

...Table of Contents What Is Malware? ..………………………………………………………… 3 History of Malware …………………………………………………………. 4 Types of Malware …………………………………………………………… 5 How to Prevent Malware …………………………………………………… 7 Attacks on Mobile Devices …………………………………………………. 9 Conclusion …………………………………………………………………. 11 References ……………………………………………………………………. 14 What is malware Malware, short for malicious software, is any type of software that is used in order to disrupt regular computer operations, gather sensitive information, or gain access to private computer systems. Malware is not something new to computers; it is as old as software itself. Programmers have been creating it for as long as they have been creating legitimate software. There are many different reasons as to why a programmer would create such malware. Some programmers create malware for reasons as simple as pranks and experiments or more serious and organized Internet crime malware. There are many different types of malware that will be explained later but one must know that each type of malware attacks a computer in a different way and causes different levels of damage. (What is Malware, 2014) Creating malware is a very vicious thing to do. It attacks an individual’s computer without the knowledge of the user and before they know it, personal information is stolen and the computer is damaged. What would make someone want to create such a thing? In the earlier stages of......

Words: 3391 - Pages: 14

Malware

...Zeus is just one of many malware toolkits available for purchase in the cybercriminal underground. This accessibility, combined with the ease at which even novice cyber criminals can use these tools, are key reasons for the massive increase in reported malware samples (to say nothing of the millions of samples that go unreported) over the last number of years – and there’s no slowdown in sight. Zeus controllers can fine tune the copy of Zeus they are using to steal only information they are interested in; typically login credentials for online social networks, e-mail accounts, online banking or other online financial services I don’t believe that the proliferation of malware toolkits and their unique malware samples – however easily and rapidly they’re being created – foreshadows “the decline” for anti-virus products, or for the vendors to create and sell them. There is an important place for anti-virus products as part of an enterprise’s network defense system, they just need to be augmented with a comprehensive — yet cost-effective and scalable — cloud-based APT detection and protection system that provides coverage beyond their physical network. However, what this clearly demonstrates is that enterprises cannot rely entirely on anti-virus products detecting malware to keep it at bay. The blazing velocity at which new malware is being created, combined with the increasing sophistication of APTs that are designed to deftly probe, analyze, and ultimately circumvent......

Words: 451 - Pages: 2

Malware

...Malware 1. Trojan Horses For a malicious program to accomplish its goals, it must be able to run without being detected, shut down, or deleted. When a malicious program is disguised as something normal or desirable, users may unwittingly install it. This is the technique of the Trojan horse or Trojan. In broad terms, a Trojan horse is any program that invites the user to run it, concealing harmful or malicious executable code of any description. The code may take effect immediately and can lead to many undesirable effects, such as encrypting the user's files or downloading and implementing further malicious functionality. 2. Rootkits Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Some malicious programs contain routines to defend against removal, not merely to hide them. 3. Adware Adware is a form of malware which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up. While some sources rate adware only as an "irritant" others classify it as an "online threat" or even rate it as seriously as computer viruses and Trojans. The precise definition of the......

Words: 292 - Pages: 2

Malware

...Aaron McGrew Malware Malware is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. Malware is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, Trojan horses, ransom ware, spyware, adware, scare ware, and other malicious programs. As of 2012 approximately 60 to 70 percent of all active malware used some kind of click fraud to monetize their activity. A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. For a malicious program to accomplish its goals, it must be able to run without being detected, shut down, or...

Words: 638 - Pages: 3

Malware

...to search for it and destroy it”…………………...PANDA SECURITY ( 2011) Malware Overview Retrieved from http://www.google.com/images?rlz=1T4ADFA_enUS391US392&q=virus+clipart&um=1&ie=UTF-8&source=univ&sa=X&ei=nOx7TfqZEoXorAGvu5zCBQ&ved=0CDMQsAQ&biw=1174&bih=463 Malicious software, better known as Malware, is the most sophisticated type of threat to a computer system. Malware is simply code that is designed with purpose and intent to destroy, steal, disrupt or damage someone’s data, computer system or network. Malware is software that is written to do detriment to the data that resides on a computer or network, and is designed to secretly gain access to the system without the owner's knowledge or consent. Once installed, malware can run and stay resident on the system. This disruption, infection, or damage results in system degradation and performance and a loss of security. Before we had the Internet, a virus infected computer systems via the executable boot sectors of floppy disks and would execute whenever a program was run or a disk was booted. Today, malware infects a computer system in various ways. The word or term virus has been used interchangeably with malware due to the fact that the first malware to gain public attention was a virus, but malware actually encompasses the gambit of malicious software. Some of the more commonly known types of malware are spyware, Trojans, worms, rootkits, bots, bombs and zombies.......

Words: 3874 - Pages: 16

Android

...ANDROID OPERATION SYSTEM INTRODUCTION Android is a mobile operating system that is currently developed by Google, it is based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android’s user-interface is mainly based on direct manipulation, using touch gestures that loosely corresponds to real-world actions, such as swiping, tapping and pinching to manipulate on-screen objects along with a virtual keyboard for text input. In addition to touchscreen devices Google has also developed android for other platforms such Android TV for Television, Android Auto for Cars and Android Wear for wristwatches. Each of these platform have special interface to sooth the platform. Variant of Android are also used on Notebooks, game console, digital camera and other electronics. As smartphones and tablets become more popular, the operating systems for those devices become more important. Android is such an operating system for low powered devices that run on battery and contain hardware like Global Positioning System (GPS) receivers, cameras, light and orientation sensors, WiFi and UMTS (3G telephony) connectivity and a touch screen. Like all operating systems, Android enables applications to make use of the hardware features through abstraction and provide a defined environment for applications. Unlike on other mobile operating systems like Apple’s iOS, Palm’s web OS or Symbian, Android applications are written in Java and run in......

Words: 3950 - Pages: 16

Malware

...Malware CMGT/230 January 11, 2016 Malware Today’s computer systems are exposed to numerous kinds of malware threats. The goal of malware is to enter the computer system in a hidden way. The main purpose of malware is achieving monetary gain at the expense of the victims. There are a few categories of malware: Adware, Bot, Bug, Ransomware, Rootkit, Spyware, Trojan Horse, Virus, and Worm. Each one of these types of malware has a specific function and effect on the end user’s computer system. Adware is an application that usually comes bundled with an application downloaded from the internet, in which it monitors the internet activity and provides advertisement according to the internet browsing behaviors. Bots are programs designed to run automated tasks. Bots gain popularity in being used on systems to run DDoS attacks. Bugs are flaws within the applications that an attacker can take advantage to exploit the computer system. Ransomware is an application that infects the computer system and encrypts files and holds the system hostage until the end user pays a fee for the unlocking mechanism. Rootkit is a malicious piece of software that is very stealth and allows the attacker to collect all kinds of information from the system and even remote control it. Spyware is related to Adware in which spies on the user’s activity without their knowledge and collects data such as keystrokes, logins, monitoring internet activity, etc. Trojan Horse is an application that disguises......

Words: 1143 - Pages: 5