Mobile
12/17/2013
03:20 PM
Connect Directly
RSS
E-Mail

Android AV Improves But Still Can't Nuke Malware

Google doesn't let Android antivirus app makers automatically quarantine and zap malware. Until then it's up to users to stay on their toes to prevent infection.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
12/19/2013 | 6:08:47 AM
Re: Misinformed
Engineering rationales are fine, but some people will end up with malware on their system. So, given Android's mass adoption now, I think the Windows analogy is apt:

1) If your PC gets infected by a virus, do you want it to be quarantined?
2) If your Android tablet gets infected by a virus, do you want it to be quarantined?

I'd argue that the average consumer would answer "yes" to both questions. 

As you say, the malware threat is overstated. To add to that: Bigger-picture, Google -- or an AV vendor that it taps, or any OEM -- could build AV capabilties into Android. That way, you wouldn't have the risk of a third-party application escaping the sandbox. 
RupertC367
50%
50%
RupertC367,
User Rank: Apprentice
12/18/2013 | 11:50:08 AM
Re: Misinformed
steveb2005 is bang on. Come on guys, stop with the scare-mongering.
steveb2005
100%
0%
steveb2005,
User Rank: Apprentice
12/18/2013 | 9:57:24 AM
Misinformed
I'm tired of misinformed articles about Android security.  It makes sense not to allow any 3rd party application out of the sandbox, and there is no need to, despite the news hype.  Read up:

http://qz.com/131436/contrary-to-what-youve-heard-android-is-almost-impenetrable-to-malware/
PaulS681
50%
50%
PaulS681,
User Rank: Apprentice
12/17/2013 | 7:50:08 PM
Droid attacks
Sounds like a new Starwars movie. I guess that being alerted to malware is better than not being alerted but when is Google going to let these apps get rid of the malware? Or are they waiting to put out a google created app?
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If youíre still focused on securing endpoints, youíve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Listen Now Botnet Takedowns: Who's Winning, Who's Losing
Sara Peters hosts a conversation on Botnets and those who fight them.