Tuesday 16 September 2014

178 million phones at security risk in Middle East, Africa: Report

178 million phones at security risk in Middle East, Africa: Report
Over 94 percent of popular Android applications used in the Middle East and Africa are potentially vulnerable, according to a report.
Enterprise security player Palo Alto Networks says Android Internal Storage is a protected area that Android- based applications use to store private information, including user names and passwords.
According to Palo Alto Networks research, an attacker may be able to steal sensitive information from most of the applications on an Android device using the Android Debug Bridge (ADB) backup/restore function.
In addition, most of the security enhancements added by Google to prevent this type of attack can be bypassed. In the Middle East & Africa, Android has the largest market share of all platforms, at 40 per cent.
Anyone using a device running version 4.0 of Android ? about 85 per cent of Android systems in use today in the Middle East ? is potentially vulnerable.
Of the estimated 525.8 million mobile phone owners is the Middle East and Africa, this equates to over 178 million phones at risk in the Middle East and Africa, the report said.
Over 94 per cent of popular Android applications, including pre-installed email and browser applications, use the backup system, meaning users are vulnerable.
Many Android applications will store user passwords in plain text in Android Internal Storage, meaning almost all popular e-mail clients, FTP clients and SSH client applications are vulnerable.
“We encourage users to be aware and Google to take a closer look at this storage weakness in Android. Given Android’s place as the region’s most popular mobile operating system, millions of users are potentially at risk here in the Middle East and Africa,” said Saeed Agha, GeneralManager, Middle East, Palo Alto Networks.
Palo Alto Networks recommends Android users disable USB debugging when not needed, and application developers to protect Android users by setting android:allowBackup to false in each Android application’s AndroidManifest.xml file or restricting backups from including sensitive information using a BackupAgent.
Posted by : Gizmeon

No comments:

Post a Comment