TaintDroid reveals the security threat from app downloads
Android free apps display some inappropriate behaviour.
Free Android apps could pose a business threat as a new study has shown that quite a few apps transfer substantial amounts of personal data to third-parties.
TaintDroid, a proof-of-concept tool, monitored the behaviour of 30 popular Android applications. The research team from Intel Labs, Duke University, and Penn State University found 68 instances of potential misuse of users' private information across 20 applications.
The free third-party software, containing advertising banners, was found to be transmitting users' private information to remote advertising servers. The users would not have been aware of what was being sent or to whom. Some phones were even transmitting data when the adverts were not being displayed.
The information transmitted went beyond name and phone details, sometimes it also included the GPS location of the user, stored phone numbers and even SIM card identifiers. In some cases found the user's location was sent at 30 second intervals.
It is only because Android is open source that the researchers were able to legally investigate app behaviour. The team suspected that they would find the same behaviour if it could access proprietary systems like the iPhone and other mobile phone operating systems.
It must be pointed out that the apps did not just download and take over the system, they had to be given permission to access personal data. The team said that the typical user would assume this would help the application to work and just say yes without a second thought.
What the apps tended not to say was how much data was going to be accessed and how often, or where, it would be dispatched. This could be a danger for Android in business. If work contacts are accessed and their phone numbers used, it could seriously damage business relationships.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download