Android Security Gaps: How To Protect Yourself

Not just viruses and other malware threaten your Android mobile device. Even the operating system itself risks, can cost you time, money and your private data. We tell you what all you lurking and how you can protect.

Apps-contaminated, compromised Web sites and files with pests – now the dangers for Android powered devices are almost as diverse as for the PC. Add: not only threats from the outside are threatening your Smartphone and tablet. Also Android itself contains some vulnerability that can take advantage of resourceful hackers. In the worst case this has the consequence that the attackers get control over your mobile device, expensive SMS send and read out their personal data and pass. We looked at version 1.0 Android and you to enumerate all known security vulnerabilities in a table. Is also the effects and also see which protective measures you can take against it. For a complete list of all security vulnerabilities,

For a better overview vulnerabilities and other vulnerabilities are provided with the so-called CVE numbers (common vulnerabilities and exposures), an industry standard, which is administered by the CVE numbering authorities various security experts and authorities.

Of course the device manufacturer, but also Google itself try to close the discovered vulnerabilities with updates and patches. But new dangers come with each new version of the operating system and each update.

See also: Experts warn against Android app Airdroid

Stagefright and stagefright 2.0



Find cheap phone and data rates in the comparison
for example, all-net & surf Flex L for only €9.99 per month

So the vulnerability of stagefright was known, for example, in July 2015. The stagefright framework is used since Android 2.3 as a standard library to handle multimedia files. Through a vulnerability can bring the framework to crash a prepared file and the resulting buffer overflow (flooding too small storage areas with large amounts of data) are used for the execution of malicious code.

The security update that is published in the August 2015 by Google but not completely closed the gap -. In addition, more security risks were known in October 2015 (“stagefright 2.0”), which were also attributable to the defective framework. And in the log to the next security update in November 2015 notes to find that Google had closed itself further, previously unknown gaps in the framework. More to Google’s security services.

Smartphone security: Forgiven password for Android apps

Protection against vulnerabilities

How can you secure your Android device against security vulnerabilities? As a general rule: make sure that you have the latest version of Android on your mobile device, and lead you all updates on the part of the device manufacturer through. Which are based on changes by Google, not always, but also important security updates can contain. As our research shows, by the way, especially devices with Android 4.1 to 4.4 are vulnerable to security leaks.

Your device manufacturer offers no updates available for your model, and you don’t dare to play a custom ROMs, follow the safety instructions in our table, to avoid known risks. There are also apps that examine your mobile devices on many security vulnerabilities and determine whether you are affected.