π An important question for this decade, is Your iPhone Susceptible to Cyber-Hacking… is Your Android SmartPhone subject to cyber-hacking?
π Its been reported that there are thousands of individuals globally spending their time Aggravating the rest of us. Some perform these intrusions in our privacy to be annoying; others have more devious purposes, namely identity theft, monetary theft, burglary, fraud, mentioning a few.
π Android Targeted by an astonishing 79% of all SmartPhone Malware, because it is more vulnerable to Viruses, according to U.S. Department of Homeland Security and FBI surveys. According to this survey the U.S. Department of Homeland Security and the FBI, uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was successful directly against Android devices, because its Operating System is highly fragmented rendering it more vulnerable to attack and has less Security Capability.
π Fragmentation of Android’s Operating System, is a major contributor to successful Malware attacks. Fragmentation generally is a phenomena where smartphone users either refuse to update, or intentionally elect not to update their smartphones’ operating system, OS, when new released are published.
π Many Smartphone users simply do not understand that smartphone OS updates contain Anti-Malware algorithms as well as improvements to the hand-sets’ general operation. Other smartphone users elect Not to upgrade their OS, as the Upgrade may cause their smartphone to Freeze, or many of its Apps may become inoperable.
π Fragmentation is Rampant with Android Users, because there are over 11,700 different android handsets in circulation, where older models do not have sufficient hardware capabilities, processors, memory, etc, to effectively install the Newer OS updates; Accordingly of Three Android users, only One-In-Three Android users update to the New Android Operating System. Conversely, TWO our of THREE Android Users do not Update periodically, therefore do NOT have the most current Anti-Malware software protection.
π Apple’s iPhones have some vulnerabilities too, but they were with the NSA according to a recently Declassified documents. The infamous former National Security Agency contractor Edward Snowden, responsible for leaking thousands of pages of classified intelligence documents from the NSA, the USA’s secretive spy Agency, reportedly believed that the iPhone contains “special software” that can be remotely activated by the NSA for intelligence gathering purposes.
π Apple was one of the first companies accused of participation in the NSA’s secret PRISM data mining initiative, following Snowden’s release of thousands of classified NSA documents. The PRISM project is said to have involved the extraction of “audio, video, photographs, e-mails, text messages, documents, and connection logs that enable analysts to track a person’s movements and contacts over time.”
π Apple immediately denied the accusation, saying that they “have never heard of PRISM” and that “Apple does not provide any government agency with direct access to our servers.”
π Later “Snowden leaks” revealed that NSA had created spyware targeted at SmartPhones and iPhone, which would have given intelligence services access to SMS messages, on-board data, live microphone feeds, and GPS and WiFi location-positioning information. It remains unclear how successful the program was.
π Apple vehemently denied involvement, and recently announced that its iOS software has been, and continues to be periodically updated make absolutely certain that iPhones and iPads are protected with the latest Anti-Malware software, and to assure that there are “No Back Doors for entry into one’s iPhone.”
π Apple Confirmed it has never worked with the NSA to create a “backdoor in any of our products, including iPhone,” the company said following news of the project. “Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security.”
π Android’s lack of security is due to "Android Operating System Fragmentation" as more than 50% of Android users are using Older OS Versions, for fear of having their smartphones or its Apps become inoperable, even though these users are significantly more Vulernable to Viruses, Worms, Trojans, Spyware, and Malware. Newer versions of Android have become more secure, but the user-base is not updating to the new version. There are over 11,800 different Android devices in operation today. Android simply cannot keep up with their Operating System vulnerabilities, nor can the Android designers convince their users to upgrade, which would protect many of them.
π Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware is Very Serious Business. These days we have more Confidential Identity information, Bank Accounts, Passwords, Emails, Test Messages, than in any other single device. Keeping our personal information safe and secure is extremely important, perhaps even more important than on our PC computers. Reports such as this among other safety concers are likely the reasons that Apple is spending millions of dollars and thousands of hardware-software engineering hours to protect its iPhone customers.
π According to a survey conducted by the U.S. Department of Homeland Security and the FBI and uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was intended for Android. Indeed, Android was targeted by an astonishing 79 percent of all smartphone malware. The following is an excerpt from the Unclassified report from a survey conducted by the U.S. Department of Homeland Security and the FBI.
π (U//FOUO) Android mobile operating system (OS) continues to be a primary target for malware attacks due to its market share and open source architecture.
π Industry reporting indicates 44% of Android users are still using versions 2.3.3 through 2.3.7-known as Gingerbread, which were released in 2011, and have a number of security vulnerabilities that were fixed in later versions. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile OS patched and up-to-date. The following are some known security threats to mobile OS and mitigation steps.
π Android was targeted by an astonishing 79% of all smartphone malware that year far more than any other OS. The agencies found that Apple’s iOS was targeted by 0.7% of malware attacks, Windows Phone and BlackBerry by 0.3% and Symbian OS by 19%.
π In a memo citing the research circulated nationwide to law enforcement, security and emergency personnel, the DHS and FBI note that a significant number of Android users continue to run older versions of the OS that leave them open to a number of security vulnerabilities — something companies with rival operating systems love to point out.
π Recall that over 93% of Apple iOS users, about 400 million of them, have updated to the iOS6 which contains all the latest Protection against Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware. This is largely why Apple’s iOS has experienced less than 1% of such vulnerabilities.
</p
Pleased you’re reading, with about 75,000 readers world-wide, growing by thousands each month, giving motivation as new topics are published every day. Spread the Word to your friends, family, and associates; Forward the link below, post it on Facebook, Twitter, LinkedIn, Social Networks for their review,, Anyone may subscribe, its secure and confidential; Every time I publish an article, WordPress will send a reminder (no Ads of course) with a link to my new Article: http://ift.tt/19pAPPd
Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.
To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 25,900,000 visits as of January, 2015: http://www.416-1100.com .
If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU: http://ift.tt/19pAQ5y
When I do what I do… I usually do it here.
As a "Health Nut" for Health & Wellness; http://ift.tt/1iIfMrA
As many of my friends, family and students know, I am an avid iPad adopter since its release April, 2010. With Apple’s release of the Retina-Display iPad Air 2, (I sold iPad 4 to Gazelle.com) applied the proceeds to purchase the "mini" with 128GB of Storage, AT&T connectivity, plus added Logitech’s UltraThin Keyboard Cover, and a DECODED natural leather thin slip-over protective case.
Filed under: Android Devices, Apple iPhone and iPad News, Applications for smart phones, Apps, Applications, iPads, iPhones, BlackBerry RIM Devices, Cyber Security, Hacking, Cyber Threats, Worms, Viruses, iOS Devices - iPads - iPhones, NEWS - Android Devices, NEWS - App Revews, NEWS - Cyber Security: Spyware Malware Trojans, Worms Viruses, NEWS - iPads & iPhones, NEWS - Science & Technology, NEWS - Technology - Devices, NEWS of Public Interest
via WordPress http://ift.tt/1ySIhPn
No comments:
Post a Comment