Ready to panic
Android Windows fetches in the most widely used computer – also by cybercriminals. G-Data Security Company now has 4,900 new malicious Android apps per day. In 2011, there were no four thousand a year -. When the smartphone was young and innocent
Against new threats Protect your new updates, but manufacturers of Android phones are slow to renew the software. Therefore tight, 12 percent of Android users the latest version, 5.0, or 5.1 installed. The rest work with legacy systems, with the associated ancient faults.
The Consumer Association began a campaign to move faster upgrades to provide phone manufacturers, also for older phones. Manufacturers do look out link. Why would you continue to update old models when you can sell your customers a new phone?
More panic
More Android panic. According to researchers at the VU the doors of Android, the most widely used mobile operating system (more than 80 percent of the phones), wide open to cyber criminals.
You can from a compromised PC to the site from the Google Play Store go, install malicious software on a phone and, for example intercept the extra security of a person’s ING account.
Evil. Hack. Banking: That sounds serious. Hence, De Volkskrant reported about it. The vulnerability was what turned thick: it was “simple” to break in on all phones. Criminals had ‘free play’. And how Google took it into his head not to recover these serious error.
FUD enough
The criticism from other security specialists was solid. They did not find that there was a bug. On Security.nl comments were not tender and the Android world reacted skeptically. Computerworld wrote: “There is enough FUD – Fear, Uncertainty and Doubt – in the world.” In the worst case scenario of the VU must be first because the password of a Google account being hacked. That’s not unimportant detail. Once you have those keys, you as a burglar or free play.
There’s relish a bug in Android, say the university researchers. But what they mostly demonstrated the ease of overdose include Web services like that suffer from Google. Google combines all of your Android devices to one account. Tablet, PC, phone, all access, all synchronized via the browser and the magical Google cloud. To do this, Apple also via iCloud. Only the Apple more difficult to remotely install software and the App Store better controlled than the Play Store.
Colin logs into
Google confuses vulnerabilities more often with ease. A story from the past: a few years ago reported Colin Angle, tech editor at nu.nl that my passwords work PC emerged. When we Google for clarification asked thought the company that we once had the same PC tested under the same Windows account, and both signed had in Google’s Chrome browser
Free translation of that scenario:. We had held an infection a chance encounter with a third party. Thanks to the Google account passwords moved through the cloud to all devices from Colin, and his work PC. What I saw as a mistake, Google just regarded as a feature: sync, even if you do not want
Wonderclean synchronized
Google offers few options for the automatic connection between all of you. breaking devices. Therefore, the VU researchers advise using multiple Google accounts for your gadgets. The downside: you lose that wonderful feeling synchronous and must think first before using any device
The advantage. If you put a line through the dangerous combination of extreme ease of use and blindly trust. A bit of FUD on his day can not hurt.
No comments:
Post a Comment