Downloads: Free Remote Support: Click here  Remote Monitoring: Click here

News

<a href="/news/mobile-devices-running-older-operating-systems-potentially-open-to-attack" title="Mobile Devices Running Older Operating Systems Potentially Open to Attack">Mobile Devices Running Older Operating Systems Potentially Open to Attack</a>
Posted on: 02 Apr 2015 

Posted By: ITWiser Webmaster

Mobile Devices Running Older Operating Systems Potentially Open to Attack

 
 

Mobile Devices Running Older Operating Systems Potentially Open to Attack

Professional hackers are advising Android users that some older operating systems can leave your devices open to a stealth attack.

By downloading a seemingly safe app from a reputable site such as Google Play hackers have been able to lay the foundation for some other apps to use that foundation to access information illegally from your device.  Not only can these two seemingly safe apps work in conjunction to steal your personal data, they can also be used to “replace” app content and even entire apps without you knowing. 

This threat is only on devices that are running Android 4.1 or older and are downloaded to a file system that is vulnerable. Many of the industry players such as Google and Amazon as well as Samsung are aware and have been working to fix these vulnerabilities by updates.

There is little evidence that this has been a real threat to most users but it highlights vulnerabilities for users potentially infecting computer networks with malware from these replaced apps. Many people link their smartphones and other android devices to hardware, sometimes for something as benign as charging their devices. The same cables that charge the devices can also transfer data unwittingly on to your system.

Making sure your staff are well aware of the risks of exposing your systems to external threats can be identified by our Internal Security Audit which looks to whether you have adequate policies in place.  We also offer a Managed Service, which includes a system of Mobile Device Control where we use apps that can monitor the use of company mobile devices and can even control and wipe devises remotely should the need arise.



 
The Register