<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Android Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/android/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/android/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Tue, 27 Jun 2017 10:35:24 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Android Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/android/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Permission to spy on you?</title>
		<link>https://www.l2cybersecurity.com/permission-to-spy/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 27 Jun 2017 10:35:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[iOs]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=767</guid>

					<description><![CDATA[<p>Most people have smart phones these days and of course smart phones really come into their own through the use of Apps. There seems to be an app for every conceivable thing and lots of them are free. The phone makers make a good effort to protect us from bad apps by making sure that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/permission-to-spy/">Permission to spy on you?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignleft wp-image-769 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1.png" alt="Permission to spy on you" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" />Most people have smart phones these days and of course smart phones really come into their own through the use of Apps. There seems to be an app for every conceivable thing and lots of them are free. The phone makers make a good effort to protect us from bad apps by making sure that when we install or update an app, which wants to access, for example, the camera &#8211; then we are shown this clearly and we have to grant the app permission to have the access it wants.<span id="more-767"></span></p>
<p>But do we really pay attention to these pop-ups that advise us what the app is looking to get permission to access? I would say no in most cases, because we just want to get the app and we trust the maker of said app, so let it have whatever it wants.</p>
<p>I&#8217;m raising this issue following:</p>
<ol>
<li>the recent revelation about <a href="https://www.wired.com/story/how-to-turn-off-snapchat-snap-maps/">Snap Map</a>, which is effectively Snapchat&#8217;s stalker mode, where you can see the current exact location of other Snapchat users.</li>
<li>a discussion with a colleague who uses an app that was developed for a small, rural community area and which she discovered showed the current exact location of any other user of the app.</li>
</ol>
<p>In the case of Snapchat, they are a large corporation with a huge number of end users and the revelation about the Snap Map feature has gotten quite a lot of media attention. Therefore a lot of people will have become aware of it and for those people who are concerned for their privacy, there is a means of disabling it, while still using the app for it&#8217;s original intended purpose.</p>
<p>In the second case above, there is probably only a hundred or so end users of this app, which was supposedly a simple community noticeboard. The discovery of the map containing the location of current users was made by accident and caused great concern for my colleague, who is now going to speak with the app developer. There is no way to disable the location tracking without uninstalling the app.</p>
<p>That app, when it was being installed, obviously asked for permission to the person&#8217;s identity and location (amongst other things), but like most people, anybody downloading the app would have trusted their local app developer and just accepted whatever permission was requested by the app, without question.</p>
<p>I tend to be more careful about what permissions apps are looking for, before I let an app install or update (with new permissions). For example, I have an old Android phone (not my primary device), which is no longer receiving updates from Google. So there probably exists vulnerabilities which are not being patched (if you wonder why this is important, you obviously haven&#8217;t read <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> <img decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/fe5/1/28/1f60f.png" alt="?" width="16" height="16" />).</p>
<p>I therefore downloaded the free Avast Anti-Virus app to give me an additional layer of protection (in keeping with <a href="http://www.l2cybersecurity.com/use-anti-virus/">Commandment 2</a>). Initially it looked for permissions to in-app purchases, Device &amp; App History, Identity, Contacts, Location, SMS, Phone, Photos/Media/Files, Wi-Fi Connection information and Device ID. I was a little cagey about it needing access to location. Avast is a large company with a good reputation, so I took the decision to allow it access.</p>
<p>Then several weeks ago it looked to update the app and needed some additional permission granted. Now it wanted the following:</p>
<p><img decoding="async" class="aligncenter size-full wp-image-770" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission.png" alt="Avast additional permission" width="236" height="358" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission.png 236w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission-198x300.png 198w" sizes="(max-width: 236px) 100vw, 236px" /></p>
<p>I can see no justifiable reason for an Anti-Virus application to need permission to access the camera and microphone, let alone Bluetooth connection information. Viruses do not come through by the phone looking at or listening to something. So I have not allowed it to be updated.</p>
<p>Everyone really needs to be more careful when installing or updating apps, particularly when presented with the permissions pop-up. Just think &#8220;What is this app going to do for me?&#8221; and then go through each of the permissions it is asking for and say &#8220;Why does it need access to &#8230;?&#8221;. If you are really unsure, then please ask somebody who knows about such things (and not your pre-teen or teenager). If you want, you can reach us at <a href="mailto:support@L2CyberSecurity.com">support@L2CyberSecurity.com</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/permission-to-spy/">Permission to spy on you?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Nightmare on Quadrooter Street.</title>
		<link>https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 06:39:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Quadrooter]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=548</guid>

					<description><![CDATA[<p>When I was a teenager, watching slasher flicks like A Nightmare on Elm Street (the original 1984 version) and Halloween, in order to look like a &#8220;tough guy&#8221; I developed a sort of movie watching buffer whereby when any startling occurrence happened (e.g. the scary guy leaps out of the shadows), I would simply sit&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/">A Nightmare on Quadrooter Street.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">When I was a teenager, watching slasher flicks like <i><span style="color: #666666;" data-blogger-escaped-style="color: #666666;">A Nightmare on Elm Street</span></i> (the original 1984 version) and <i><span style="color: #666666;" data-blogger-escaped-style="color: #666666;">Halloween</span></i>, in order to look like a &#8220;tough guy&#8221; I developed a sort of movie watching buffer whereby when any startling occurrence happened (e.g. the scary guy leaps out of the shadows), I would simply sit there all cool-like while all around me leaped out of their seats. I would mentally take a moment to let the occurrence happen and then internally say &#8220;Yep! That thing that happens in every scary movie happened&#8221; and just continue watching. I just don&#8217;t react to the situation the instant it happens.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Nowadays I continue this type of trick when I read scary stories. For example, last weeks <a href="http://www.l2cybersecurity.com/garda-systems-hit-by-ransomware/">blog post</a> about the Garda Síochána hack. After all the initial &#8220;Mob hack the Garda&#8221; hyperbole, it would appear, after a few days, that it was a simple Ransomware incident.</span></p>
</div>
<p><span id="more-548"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And so it is with the <a href="https://www.checkpoint.com/resources/quadrooter-vulnerability-enterprise/">recent story</a> from Check Point Software Technologies Ltd about their sexily named Quadrooter. A set of four vulnerabilities what they discovered in the Qualcomm chips that are in use in up to 900 million Android devices worldwide.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There&#8217;s no denying that the vulnerabilities exist, but were things as bad as Check Point were making out? Obviously if you purchased Check Point&#8217;s security solution for mobile devices, you would be protected from Quadrooter, but guess what? You were most likely already protected &#8230; by Android itself.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As long as you are running Android 4.2 or higher on which &#8220;Verify Apps&#8221; was turned on by default and have not changed the app store settings to enable &#8220;Unknown Sources&#8221;, you won&#8217;t be affected by 3 of the 4 vulnerabilities. Simples. Google are working on a patch for the 4th vulnerability. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">According to Google, 90% of the 900 million devices quoted by Check Point will be protected from Quadrooter, and the remaining 10% would be if they re-enable &#8220;Verify Apps&#8221;.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">You can see further information <a href="http://www.androidcentral.com/google-confirms-verify-apps-can-block-apps-quadrooter-exploits">here</a>.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So another Scary Story that, with the passing of a few days, turns out not to be so scary after all.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/">A Nightmare on Quadrooter Street.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
