DTX Manchester DTX Manchester
  • About Us
Wednesday, 20 January, 2021
IT Security Guru
CTX Manchester 2020 banner ad
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Holes in Android patching implementation mean app providers need to take charge of security

by The Gurus
April 22, 2016
in Editor's News
Angry Android
Share on FacebookShare on Twitter

Despite recent efforts by Google to address Android security vulnerabilities through a series of software patches, mobile handset providers are not demonstrating the urgency required to bring these fixes to all of their users. As a result, app providers themselves need to take the initiative and implement their own measures to keep user data safe. This is according to Norwegian app security firm Promon.

Google’s recently published Android Security 2015 Annual Report has revealed that, despite steps to introduce patches to combat issues such as last year’s Stagefright bugs, 29 per cent of the unique Android models available to the public are not supported to receive these regular updates. This tardiness on the part of many handset vendors is leaving millions of users at risk of cybercrime, and shows that it is time for app developers to take security matters into their own hands.

Tom Lysemose Hansen, founder and CTO at Promon, commented: “Google has upped its game and is doing its part to address the glaring vulnerabilities that bugs such as Stagefright exposed. But once these patches are produced, it’s then up to individual handset vendors to make sure the updates are customised for each device and then rolled out to users. Google’s own Nexus devices now receive these updates, but adoption amongst other vendors has been – for want of a better phrase – patchy.”

In addition, Symantec’s 2016 Internet Security Threat Report has shown a 77 per cent year-on-year growth in the number of new Android mobile malware variants. This indicates that Android-focused hackers have established themselves as a serious threat, and are now concentrating on refining their craft.

Hansen added: “The Android threat landscape is a rapidly evolving one, and hackers are much savvier now than they once were. As a result, delaying in making regular patches available can have serious consequences in terms of increased data theft and fraud. This can cause significant damage to the reputations of handset vendors and, by association, app providers.”

To address these issues, Hansen believes that app providers should take matters into their own hands, by taking steps to protect their own apps.

Hansen said: “Google’s report has shown that it’s very difficult to rely on handset providers to make security patches available swiftly and efficiently. By introducing self-defending app software, providers can take charge of their customers’ data security by protecting their apps from any threats that may have found their way onto a user’s device. 

“What app developers need to realise is that they represent a crucial cog in the Android cybersecurity machine. With handset developers representing an unreliable and inefficient medium through which data can be secured, it’s time for the app makers themselves to step up. Hackers are refining their craft; it’s now up to the app providers to refine theirs.”

0 0 vote
Article Rating
FacebookTweetLinkedIn
Tags: AndroidappsCyber SecuritycybercrimeGoogleinformation securityinfosecurityit securitymobile securityPromon
ShareTweetShare
Previous Post

FBI paid at least $1.3M for zero-day to get into San Bernardino iPhone

Next Post

Compromised Credentials Still to Blame for Almost a Quarter of Data Breaches

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

View from the back of an aeroplane aisle.

Airline Passenger Data Stolen by Hackers

January 20, 2021
iPhone X/11, open Mail application with empty inbox. To the left of the phone is a green plant.

Emails exposed to SolarWinds Hackers

January 20, 2021
Money signs

Covid-19 and Brexit result in 70% of UK financial firms suffering cyber-attacks

January 20, 2021
Camera lense

1.4 million Pixlr user records shared on hacker forum

January 20, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept