In those days, you don’t go to the west unprepared for an attack, such is the word of Nicholas Peroco, senior vice president, Trustwave’s SpiderLabs while referring to Google’s Android as “modern technology’s version of the Wild West. ”
At the RSA security conference in 2011, many security professionals raised an alarm of potential dangers over the Android platform. In the past 18months, the Android has been the target of several attacks, predominantly through malicious apps.
At this year’s Black Hat security conference, the warning was not anymore on only the potential dangers for Android, but the dangers that are already in operation. This time, the hackers are the big threatners according to TechnoBloom.
“While the hackers appreciated Google’s effort to plug security issues with Android, they also reminded that developers of malicious software too are making progress by coming up with newer ways to breach Android’s security barriers.”
The Near-field-communication (NFC) connections is the tool the hackers employ to access the Android-run devices. NFC tecnology is used in making financial transactions and to share photos., for example, bringing a device close to another device with NFC. And this method is becoming a popular way of making payment for purchases in a time when cash register and credit cards reader are not available.
It was revealed by As PC Pro at Black Hat that a serial phone hacker, Charlie Miller said he has designed a hack device that would hijack person’s phone.
Quoting the report, “Miller said he had created a device the size of a postage stamp that could be stuck in an inconspicuous place, such as near a cash register at a restaurant. When an Android handset is close enough, he could gain access to the system. Miller also showed off Bluetooth hacks to access data stored on handsets.”
Other methods the hackers uses to attack the Android were also discussed at the conference, such as employing the malicious code that make uses a flaw in Google chrome.
Anyway, this doesn’t stop people from using their Android devices, but businesses should be careful on how they make use of the Android in making transactions.