Mobile
12/17/2013
03:20 PM
Connect Directly
RSS
E-Mail

Android AV Improves But Still Can't Nuke Malware

Google doesn't let Android antivirus app makers automatically quarantine and zap malware. Until then it's up to users to stay on their toes to prevent infection.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
12/19/2013 | 6:08:47 AM
Re: Misinformed
Engineering rationales are fine, but some people will end up with malware on their system. So, given Android's mass adoption now, I think the Windows analogy is apt:

1) If your PC gets infected by a virus, do you want it to be quarantined?
2) If your Android tablet gets infected by a virus, do you want it to be quarantined?

I'd argue that the average consumer would answer "yes" to both questions. 

As you say, the malware threat is overstated. To add to that: Bigger-picture, Google -- or an AV vendor that it taps, or any OEM -- could build AV capabilties into Android. That way, you wouldn't have the risk of a third-party application escaping the sandbox. 
RupertC367
50%
50%
RupertC367,
User Rank: Apprentice
12/18/2013 | 11:50:08 AM
Re: Misinformed
steveb2005 is bang on. Come on guys, stop with the scare-mongering.
steveb2005
100%
0%
steveb2005,
User Rank: Apprentice
12/18/2013 | 9:57:24 AM
Misinformed
I'm tired of misinformed articles about Android security.  It makes sense not to allow any 3rd party application out of the sandbox, and there is no need to, despite the news hype.  Read up:

http://qz.com/131436/contrary-to-what-youve-heard-android-is-almost-impenetrable-to-malware/
PaulS681
50%
50%
PaulS681,
User Rank: Apprentice
12/17/2013 | 7:50:08 PM
Droid attacks
Sounds like a new Starwars movie. I guess that being alerted to malware is better than not being alerted but when is Google going to let these apps get rid of the malware? Or are they waiting to put out a google created app?
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If youíre still focused on securing endpoints, youíve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.