{"id":2046,"date":"2010-09-30T09:21:24","date_gmt":"2010-09-30T08:21:24","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2046"},"modified":"2010-09-30T09:21:24","modified_gmt":"2010-09-30T08:21:24","slug":"android-phones-have-security-problems-too","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/","title":{"rendered":"Android Phones Have Security Problems Too"},"content":{"rendered":"<p>We talk about iPhones here a lot, since they&#8217;re Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the coverage necessary to use an iPhone. While iPhone security issues always get a lot of coverage, it&#8217;s important to point out that other smartphones have problems as well. In particular, it turns out that many Android apps collect user data in ways that users are unaware of, and that &#8220;Android&#8217;s course-grained access control provides insufficient protection against third-party applications seeking to collect sensitive data,&#8221; according to <a href=\"http:\/\/appanalysis.org\/tdroid10.pdf\">a paper<\/a> to be presented at the <a href=\"http:\/\/www.usenix.org\/events\/osdi10\/index.html\">USENIX Symposium on Operating Systems Design and Implementation<\/a> next week.<\/p>\n<p>As <a href=\"http:\/\/news.cnet.com\/8301-27080_3-20018102-245.html\">Cnet reports<\/a>, researchers developed a tool called TaintDroid that &#8220;analyzes in real-time what potentially sensitive information is collected, including GPS data, phone number, contacts, IMEI (International Mobile Equipment Identity) number that identifies the device, and the SIM card serial number.&#8221; With this tool, they looked at 30 of the most popular Android apps, and determined that 2\/3 of them collected such data.<\/p>\n<p>While many people worry about security vulnerabilities in smartphone apps, data collection can be a more serious issue, given the types of confidential data these devices contain. It remains to be seen just what the companies behind these apps do with the data, but nothing prevents an app from &#8220;phoning home&#8221; and giving its developer more data than you would want it to. And, as <a href=\"http:\/\/www.theregister.co.uk\/2010\/09\/30\/suspicious_android_apps\/\">The Register points out<\/a>, &#8220;There are no guarantees apps for Apple&#8217;s iPhone or Research in Motion&#8217;s Blackberry would fare any better if subjected to the same scrutiny.&#8221; <\/p>\n","protected":false},"excerpt":{"rendered":"<p>We talk about iPhones here a lot, since they&#8217;re Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the coverage necessary to use an iPhone. While iPhone security issues always get a lot of coverage, it&#8217;s important to point out that other smartphones have [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2047,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[21,123],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We talk about iPhones here a lot, since they&#039;re Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Phones Have Security Problems Too  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We talk about iPhones here a lot, since they&#039;re Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-09-30T08:21:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/\",\"name\":\"Android Phones Have Security Problems Too - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#primaryimage\"},\"datePublished\":\"2010-09-30T08:21:24+00:00\",\"dateModified\":\"2010-09-30T08:21:24+00:00\",\"description\":\"We talk about iPhones here a lot, since they're Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Phones Have Security Problems Too\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Android Phones Have Security Problems Too\",\"datePublished\":\"2010-09-30T08:21:24+00:00\",\"dateModified\":\"2010-09-30T08:21:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#webpage\"},\"wordCount\":272,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg\",\"keywords\":[\"Android\",\"Smartphone\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We talk about iPhones here a lot, since they're Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/","og_locale":"en_US","og_type":"article","og_title":"Android Phones Have Security Problems Too  - The Mac Security Blog","og_description":"We talk about iPhones here a lot, since they're Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-09-30T08:21:24+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/","name":"Android Phones Have Security Problems Too - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#primaryimage"},"datePublished":"2010-09-30T08:21:24+00:00","dateModified":"2010-09-30T08:21:24+00:00","description":"We talk about iPhones here a lot, since they're Apple devices, but some Mac users may use or want to use an Android phone, or may simply not have the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Android Phones Have Security Problems Too"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Android Phones Have Security Problems Too","datePublished":"2010-09-30T08:21:24+00:00","dateModified":"2010-09-30T08:21:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#webpage"},"wordCount":272,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/android-phones-have-security-problems-too\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg","keywords":["Android","Smartphone"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/09\/android.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-x0","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2046"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2046"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2046\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/2047"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}