ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Android Malware Protection - How to Avoid the Android Malware Epidemic

Updated on November 15, 2016
janderson99 profile image

John uses his scientific skills (PhD) & experience developing 50+ websites to research, review & evaluate SEO, website design, Social Media

Malware on smartphones has been largely ignored by most users who are unaware of the problems and their need to be vigilant in preventing infections. The amount of malicious software targeting Android smartphone system is growing daily, fed by user ignorance. Data compiled by various Antivirus firms show that Android malware, has risen about 40% in the last three months and has risen about 80% rise in the last year.

People install all sorts of apps without doing even the basic checks. People are aware of what to look for and the precautions to take to avoid malware infections on their PCs and laptops through bogus software and emails, but totally ignore the dangers on their smartphones. Its like a disease with a long incubation time that is spreading through the population because people are not taking precautions.

Many smartphone experts say the problem will grow until many more of Android customers experience all the inconvenience, frustration, and damage cause by a malware infection.

Like malware on a PC once you have an infection you can spread it to your friends. Suddenly your bandwidth disappears or you have a phone bill five time your normal rate and your friends start complaining - Take precautions now before its too late. The term 'malware' includes a wide range of malicious software such as a virus, or a trojan, or anything else that does unwanted things on your smartphone.

Known Effects of Malware Infections include:

  • Sending messages without your permission to premium and expensive service SMS numbers
  • Transmit your personal data and information on the smartphone to unknown parties
  • Connecting your phone to a botnet network so that it can control your phone and execute commands remotely on your smartphone.
  • Allow others to monitor your phone calls, view your saved messages and see your text messages
  • Delude you into divulging financial information, such as birth date, account number, passwords and log in details and lots more
  • Infecting your PC if you connect to your smartphone

Why is Android More Vulnerable?

Android is more vulnerable because its open source and many players are involved - Apple owns and maintains complete control over the iPhone iOS operating system and regularly makes updates to all its customers at once, when a vulnerability is detected. Various manufacturers build Android phones, often modifying the software. Security updates are the responsibility of the carriers, not Google, and this makes the Android system much more vulnerable.

There are virtually no security checks for Android Apps - Anyone can post an infected app and other product into the Android Market or to a third-party app store. It is simply too easy to upload virtually any app. There is virtually no review system at all apart from the reviews and feedback provided by damaged users - but who reads these reviews and warnings.

Constant Upgrades to New Phones is part of the Problem - Unlike iPhones which are buy-once and use to 'end-of-life', Android customers are more likely to buy new handsets every 6-to-18 months, often switching to new manufacturers and this increases the risk that the new phone will be vulnerable to infection.

Upgraded Software has Security Improvements but its Still Vulnerable - Even after the recent release of Android 4.0 (Ice Cream Sandwich) that include upgraded security, such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) the new software is still vulnerable. Various manufacturers tweak the software. Malware designers are always well ahead of the patches. Manufacturers should put much higher priority on security and users should not assume that the new software makes the software completely safe. Security advisers claim that the Android Market will probably never be as secure as the iTunes App Store. Only when Google and the manufacturers of the Android smartphones recognise the severity of the vulnerabilities will they do anything serious about it even to list known malicious Android apps.

What can Users do to Guard against Malware

Don't Blindly give Permission for Doubtful Apps - Many users blindly let Android apps access their smartphones without any check or precautions. Most users don't take the time to read and fully comprehend permission decisions. If you don't want apps to have access to your personal data, then don't install these apps and give them permission.

Lock Your Phone - so if your phone gets lost or stolen people cannot steal your personal information. If the phone is not returned to you, the person who has the phone would have to delete your personal data as part of the process of restoring everything to its factory settings and defaults.

Use a Secure Network - All transactions that involve personal information should never be made on an insecure network. Treat free Wi-Fi connections very warily and they are the source of many infections and they are many ways of tricking you into divulging your private data.

Only Install Trusted Apps - Only install applications from trusted companies or which pass the 'review before download' test. Always locate and carefully read the reviews of the app to ensure there are no security issues that apply to it or related apps from the same company. Only download apps from 'known' developers. If the app is new or from an unknown developer always do a quick check via Web search for both the developer and the name of the app. If the app is new - wait until reviews or information is available. Its not worth the risk.

Log Out Frequently - Keep your log-in information and passwords off your phone, and change them frequently. Always log out quickly every time you finish an online banking transaction or anything else that involves your personal data. This terminates the session and does not leave your the username and password exposed.

Install Mobile Security Software - There are various security apps available that offer virus protection and can detect and quarantine various types of malware. Packages from anti-virus companies such as Norton and McAfee can also be purchased. Up until recently, most Free Anti-malware Apps for Android were not very effective. A recent review showed that Only Zoner Anti-Virus Free showed relatively acceptable performance, with malware detection effectiveness of about 32%. Read the reviews and get a good one. Always check the reviews before investing in these protective apps to make sure they work.

Stick to the Default Software - Smartphones with factory settings have the lowest risk, and as soon as anything is changed the risk of intrusion increases. unlocking a phone or jail-breaking can increase the vulnerability.

Beware of unknown text Messages - As for emails, viruses and malware can be embedded within, or linked to, text messages. When opened, the malware can infect a mobile device. As for emails be very careful with any text from an unknown number, especially if the number looks suspicious or invalid simply delete the message without opening it.

Always check and Listen to User Reviews and Warnings - Other users may let you know if they are aware of problems with an app, including potential malware. If you know of any problems yourself then post information about it. Web searches are a very good way of checking for potential problems. If in doubt don't use the app.

© janderson99-HubPages



© 2011 Dr. John Anderson


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)