Android Gets Hacked Again, Millions Affected Unknowingly, Advantage: Apple

The Android community should definitely tread softly with what kind of applications they are downloading from the Android Marketplace. There has been a flurry of malicious software making its way to the Androids app purchasing medium that has been affecting millions of users of the software. The latest installment of the epidemic, according to Venture Beat, comes from an application that has disguised itself as a collection of wallpapers that Android users can use to change the background of their device.

When the application was examined, it was discovered that it was sending information about the end-users Internet browsing activity, phone numbers, passwords, subscriber identification, text messages along with other personal private information. The malicious software would then gather this information and then send it to select servers in China. It has been estimated that the app has effected more than four million people in the Android community.

It sends the data to a web site, That site is evidently owned by someone in Shenzhen, China. The app has been downloaded anywhere from 1.1 million to 4.6 million times. The exact number isnt known because the Android Market doesnt offer precise data.

While some applications often do access personal information of a users device, it can be rather confusing for the average user (in which Googles Android platform is purchased by almost entirely and is most of the mobile world user-base) to discern and understand what each and every disclaimer for different types of data access means. Because of this, consumers may give pass to certain data access requests in order to get started using the application. There is no personal pre-examination per se for the approval of an application on the Android platform (which is one of the main reasons why applications get posted to the Marketplace so quickly). Google does sandbox their apps and force them to inform the user of what it will be accessing, though. However, this leaves the user to decide which information an application can access, which, if not tech savvy (as most users arent), will result in the person just granting access to data for the application. Being that this is so on the Android platform, the disclaimer for data access is pretty much frivolous if not evaluated first by the user.

Applications on Apples App Store are examined by a team of individuals from Apple themselves. When an application is submitted to the App Store, it goes through an examination and approval process. The operation is completed within seven (7) days of the applications original submission date. During the examination, each and every application is screened both digitally and humanly in every aspect of their anatomy for malicious and suspicious activity, as well as defects in the software. If the application passes the inspection, Apple approves the app, notifies the developer and then places the software on the App Store for distribution. If the app does not pass the exam, the application is rejected back to the developer with an explanation providing reasoning for the apps denial into the App Store. In result of Apple taking responsibility of prescreening apps before they are published, common users (again, which is most of the mobile world user-base) are relieved of the task of having to identify what data requests are OK to grant for an application to access before installing the app. In addition, when applications request data access from a users device, the request is sandboxed and detected by Apples software in which Apple notifies the user, in “plain English”, that the application wants to use certain information from the device. The user can then deny or grant access to the data for the app until the user decides not to be prompted anymore.

Users of the Android platform are advised that due to the recent spike of suspicious activity, they should be cautious of what application they are installing. The best solution would be not to install apps that you arent sure of and only the ones from familiar and publicly trusted sources (Twitter, Facebook, Google, Microsoft). Quality comparisons were conducted of the two security implementations that Android and iOS use a while back among various security firms and experts, including world famous security consultant Charles Miller. It was concluded that both companies’ sandboxing method does a great job of informing the user of what data is being accessed with some more credit being given to Apple for their plain English notifications. However, the firms and consultants gave more praise to Apple being that they took responsibility of digitally and humanly inspecting software before distributing it to the public. Now, with the recent increase in hacking attempts on Android, tech savvy individuals and experts alike are now declaring that Apple’s method seems more secure.


13 Responses to “Android Gets Hacked Again, Millions Affected Unknowingly, Advantage: Apple”

  1. Android Gets Hacked Again, Millions Affected Unknowingly, Advantage: Apple - MacApper (blog) on July 30th, 2010 8:18 am

    [...] Hacked Again, Millions Affected Unknowingly, Advantage: Apple – MacApper (blog) Gets Hacked Again, Millions Affected Unknowingly, Advantage: AppleMacApper (blog)Now, with the recent increase in hacking attempts on Android, tech savvy individuals [...]

  2. Is your smart phone spying on you? - News 10NBC on July 30th, 2010 5:38 pm

    [...] phone app doesn't say: It's watchingThe Associated PressTop smartphones spy on youInquirerAndroid Gets Hacked Again, Millions Affected Unknowingly, Advantage: AppleMacApper (blog)MWD Technology News Blog (blog) -TopNews United Statesall 762 news [...]

  3. Kellep Charles on August 1st, 2010 9:35 am

    A very interesting article from my friends at MacApper, they cover everything about Apple and Mac over. As the title stated, Google’s Android OS gets hacked again and it provides an advantage to Apple and its iPhone. Not sure if I feel the same way about that, but what is does say to me is that Apple’s AppStore vetting process does provide more security to the users than the more wide open style of Android.

  4. AndyH on August 1st, 2010 11:32 am

    This story isn’t true, you might want to read this update on the situation:

  5. usn.mustanger on August 1st, 2010 3:59 pm

    It pains me that one of my favorite bastions of Apple news ( has succumbed to sensationalist tendencies in the name of blind loyalty to the brand. Shame on you, MacApper.
    This article is in ridiculously poor form, is grossly misleading, and, in the end, turns out to be patently false in many of the points made in the writeup. First of all, look past the hyperbole. This is NOT A HACK. A blog with any journalistic integrity would have investigated the company that originally made the hyperbolic claim, analyzed their aims, and then read the follow up on the story (that AndyH mentions). It would be a fine example of journalistic integrity if you were to post a new post clarify this, if with only a hint of contrition.

  6. » The truth about those ‘data-mining’ Android apps on August 3rd, 2010 7:12 pm

    [...] “Android Gets Hacked Again, Millions Affected Unknowingly, Advantage: Apple” [...]

  7. idrive on February 9th, 2011 1:38 pm

    Hi Guys, I just found a pretty nice site for unlock / jailbreak/ iphone 3g 3gs and iphone4 jailbreak.

    Thank u Anysim Team for fast Support. :)

    Did everybody now when the update ios 4.3 for iphone4 comes?

  8. webmffasterhi on February 19th, 2011 2:42 pm

    There have been some rumors going vabout that Apple has pulled AirPrint from the final release of iOS 4.2. Apparently, a rumor came about yesterday claiming that Apple has axed the feature from the iOS 4.2 final release because of some unforeseen circumstances. Distraught by the speculated exemption of the features, a customer decided to shoot Steve Jobs a letter about it to get a further understanding of the matter. Steve replied saying that AirPrint has not been cut from the final version of the anticipated software update.

  9. Qué hacer con la seguridad de Android | Geekotic on March 10th, 2011 9:20 am

    [...] automáticamente tuvieron el regalo perfecto para, a costa de hacer leña del árbol caído, defender y vender nuevamente el modelo tirano-dictatorial de aprobación de aplicaciones en la Steve Apple Store bajo [...]

  10. Commission Pimp bonus on January 1st, 2012 10:46 pm

    may be I am gonna switch to Apple?

  11. Belts on February 14th, 2012 5:24 am

    Through governance, basic Belts rules and requirements are established; through technological controls, a steadfast Belts mechanism applies governance without bias and, finally, through vigilance, these Belts processes, procedures and controls are tested.

  12. handyborse on December 16th, 2013 6:34 am

    Heya i’m for the first time here. I came across this board and I find It really
    useful & it helped me out a lot. I hope to give something back and help others like
    you aided me.

    Feel free to surf to my site: handyborse

  13. Michel on November 21st, 2014 12:05 am

    The post you wrote was worth reading but I should admit
    that I don’t agree with you completely. Could you also tell me, what platform is this
    site built on top? I am really thinking about blogging, and I want to start with the best possible platform.
    I truly appreciate this.

Feel free to leave a comment...
and oh, if you want a pic to show with your comment, go get a gravatar!