01 June 2012

Snooping Mobile Security Apps!

Have you notice how snoopy mobile security apps have become in recent months?

NOTE: the products listed below were chosen at random from Google's Play store.  [don't even get me started on why someone would call an app market a "PLAY" store!]


Let's start with Norton's mobile product.  Norton can:
  • add and modify calendar events and sent e-mail to guests
  • read your browser's history and bookmarks
  • read your calendar events, read contact data, read sensitive log data, wrote browser's history and bookmarks and write contact data.
  • intercept outgoing calls - allows applications to process outgoing calls and change the number to be dialed.
  • read the phone state and identity - allows the application to access the phone features of the device.  It can determine the phone number, serial number of the phone, whether a call is active and the number the call is connected to.
  • modify SD card contents
  • create Bluetooth connections because it allows the phone to make and accept connections with paired devices.
  • allow Bluetooth to discover and pair with remote devices
  • create its own network sockets because it must have full network access at all times
  • modify global system settings and modify the systems settings data.
  • access course location sources like the cellular network database to determine an approximate the approximate location of your phone
  • access the GPS system to get a more accurate location of you phone
  • directly call numbers - potentially costing you money
  • send SMS messages, but it does not state that you can limit those SMS messages
  • change your audio settings
  • access extra location provider commands

How about BITDEFENDER?  Bitdefender can:
  • add and modify calendar events and sent e-mail to guests
  • read your browser's history and bookmarks
  • read your calendar events, read contact data, read sensitive log data, wrote browser's history and bookmarks and write contact data.
  • intercept outgoing calls - allows applications to process outgoing calls and change the number to be dialed.
  • read the phone state and identity - allows the application to access the phone features of the device.  It can determine the phone number, serial number of the phone, whether a call is active and the number the call is connected to.
  • modify SD card contents
  • create Bluetooth connections because it allows the phone to make and accept connections with paired devices.
  • allow Bluetooth to discover and pair with remote devices
  • create its own network sockets because it must have full network access at all times
  • modify global system settings and modify the systems settings data.
  • access course location sources like the cellular network database to determine an approximate the approximate location of your phone
  • access the GPS system to get a more accurate location of you phone
  • directly call numbers - potentially costing you money
  • send SMS messages, but it does not state that you can limit those SMS messages
  • change your audio settings
  • access extra location provider commands

TOPJOY MOBILE SECURITY.  Topjoy Mobile Security can:
  • modify your SD card contents
  • disable keylock and prevent your phone from sleeping
  • read the phone state and identity - allows the application to access the phone features of the device.  It can determine the phone number, serial number of the phone, whether a call is active and the number the call is connected to.
  • create its own network sockets because it must have full network access at all times
  • access the GPS system to get a more accurate location of you phone
  • directly call numbers - potentially costing you money
  • send SMS messages, but it does not state that you can limit those SMS messages

MOOBILA ANTIVIRUS FOR ANDROID:
  • modify your SD card contents
  • read the phone state and identity - allows the application to access the phone features of the device.  It can determine the phone number, serial number of the phone, whether a call is active and the number the call is connected to.
  • create its own network sockets because it must have full network access at all times
  • access the GPS system to get a more accurate location of you phone
  • directly call numbers - potentially costing you money
  • send SMS messages, but it does not state that you can limit those SMS messages
  • control the vibrator on your phone

MOBILE CLOUD SOLUTIONS - Andriod AntiTheft Security
  • modify your SD card contents
  • read the phone state and identity - allows the application to access the phone features of the device.  It can determine the phone number, serial number of the phone, whether a call is active and the number the call is connected to.
  • create its own network sockets because it must have full network access at all times
  • access the GPS system to get a more accurate location of you phone
  • directly call numbers - potentially costing you money
  • send SMS messages, but it does not state that you can limit those SMS messages
  • discover known accounts
While I am an avid supporter of both mobile antivirus programs and encryption software being installed on any mobile device, whether it be a smart phone, laptop, tablet, or any other mobile device, I feel we all need to be aware of what these applications we are installing have access to.

In some cases, as shown by the very limited number of examples I have listed below, I also believe they go a bit too far.  Since when does a mobile protection application need to detect and log the telephone number of a call you are connected to?  If there is a name associated with the call, and you are a doctor or nurse, this could potentially be a violation of the HITECH portion of the HIPAA laws.

My point is, before you download ANY application, make certain you have read the information on what the product has access to, how it has access and try to find out WHY it must have that access.

It's user beware when it comes to applications.  While protecting our mobile devices is a critical part of the security which we must now endure, we also need to make certain we are dealing with a reputable vendor who doesn't snoop too much in the wrong places in the name of "protecting" us.

================================================

If you have any questions, or are looking for hosted solutions, please feel free to contact me.


Copyright © 2012, Bruce Barnes, ChicagoNetTech Inc, All Rights Reserved



1 comment:

  1. i read a lot of stuff and i found that the way of writing to clearifing that exactly want to say was very good so i am impressed and ilike to come again in future..
    Mobile Universe Website

    ReplyDelete

Please keep all comments on topic and respect the poster of the original message.

Messages which attack a poster, contain profain language, are off topic, or are otherwise defamatory will be deleted from the blog.