Thursday, August 21, 2014

178m Android phones at security risk in Middle East, Africa: Report


178m Android phones at security risk in Middle East, Africa: Report

Over 94% of popular Android applications used in the Middle East and Africa are potentially vulnerable.
DUBAI: Over 94% of popular Android applications used in the Middle East and Africa are potentially vulnerable, according to a report.
Enterprise security player Palo Alto Networks says Android internal storage is a protected area that Android- based applications use to store private information, including user names and passwords.
According to Palo Alto Networks research, an attacker may be able to steal sensitive information from most of the applications on an Android device using the Android Debug Bridge (ADB) backup/restore function.
In addition, most of the security enhancements added by Google to prevent this type of attack can be bypassed.
In the Middle East & Africa, Android has the largest market share of all platforms, at 40%.
Anyone using a device running version 4.0 of Android (about 85% of Android systems in use today in the Middle East) is potentially vulnerable.
Of the estimated 525.8 million mobile phone owners in the Middle East and Africa, this equates to over 178 million phones at risk in the Middle East and Africa, the report said.
Over 94% of popular Android applications, including pre-installed email and browser applications, use the backup system, meaning users are vulnerable.
Many Android applications will store user passwords in plain text in Android internal storage, meaning almost all popular e-mail clients, FTP clients and SSH client applications are vulnerable.
"We encourage users to be aware and Google to take a closer look at this storage weakness in Android. Given Android's place as the region's most popular mobile operating system, millions of users are potentially at risk here in the Middle East and Africa," said Saeed Agha, general manager, Middle East, Palo Alto Networks.
Palo Alto Networks recommends Android users disable USB debugging when not needed, and application developers to protect Android users by setting android:allowBackup to false in each Android application's AndroidManifest.xml file or restricting backups from including sensitive information using a BackupAgent.


  Follow me on twitter for more Daily updates
                     For more reports from Asia  www.search.dowellresearch.com 
                      For any Market research consulting services  www.dowellresearch.com

No comments:

Post a Comment

Followers

Total Pageviews