Think you can protect your Android device, and the personal information stored on it, simply by properly managing app permissions? Think again. Google’s Android OS has been the target of much criticism and speculation recently, due to its ongoing—and growing—issue with mobile malware and overall mobile security. Indeed, it seems like every week some security company or code monkey comes up with a new exploit that exposes another chink in Android’s armor. Earlier this month, I penned a post with my technology predictions for the coming year, and atop that list was an influx of new mobile security threats, namely Android security threats. Today, I received a message from Web security company Via Forensics, and the e-mail made me feel even more certain of my 2012 Android security prediction. Via Forensics has posted a video clip that purportedly demonstrates the ability to install an Android application on a device, which requests no specific permissions, or access to Android system resources or sensitive data, but can still access these resources and personal information, i.e., give potential Bad Guys remote access to your Android device and data. The company claims the exploit isn’t new—though I’ve never heard of this way to “circumvent” Android’s app permissions system. But it certainly brings into question the conventional wisdom that being vigilant, paranoid even, when it comes to setting your Android app permissions can protect your Android mobile device from hackers. It also spotlights the need, on users’ parts, to download apps from only trusted and/or official sanctioned app stores, like Google Android Marketplace, as I suggested in a recent Android Security Tips story. And the video highlights the growing need for app store owners and/or administrators like Google to step up their efforts to test and vet software for malware or other potential harmful components. So, while Android application permission can certainly help protect your mobile device from dangerous software, they’re not at all foolproof, thanks to the Android OS architecture and “openness”—at least according to Via Forensics. Check out the Via Forensics video clip below for more details. AS Related content brandpost Sponsored by Palo Alto Networks x Accenture Making sense of zero trust - why a managed SASE solution is the ideal option for enterprises Security leaders are turning to SASE as their preferred network security solution amid a new era of cloud-powered businesses working from anywhere. By CIO Contributor Nov 28, 2023 4 mins Network Security feature 8 tips for unleashing the power of unstructured data For most organizations, data in the form of text, video, audio, and other formats is plentiful but remains untapped. Here’s how to unlock business value from this overlooked data trove. By Bob Violino Nov 28, 2023 10 mins Data Mining Data Science Data Management opinion What you don’t know about data management could kill your business Organizations without a solid data management strategy are on a collision course with catastrophe. Unfortunately, that’s most businesses, judging by the fundamental disconnect on the importance of strong data foundations. By Thornton May Nov 28, 2023 6 mins Data Architecture Data Governance Master Data Management brandpost Sponsored by Dell Technologies and Intel® Gen AI without the risks Demystifying generative AI: Practical tips for cost-effective deployment in your organization. By Andy Morris, Enterprise AI Strategy Lead at Intel Nov 27, 2023 6 mins Artificial Intelligence Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe