Story image

Android apps can track network connections - is it time to use a VPN?

14 May 18

While Google is finally about to address the problem of apps monitoring network activity, it’s only going to happen on the upcoming version of Android, known as Android P.

For years apps have been able to find out what other apps are connecting to the internet, when they are connecting, and what they are connecting to. While they can’t access the content being transmitted, they can sniff any connection to see if apps are connecting to a certain server, such as a financial institution’s server.

NordVPN says Google Play was filled with hidden trackers, and each downloaded app put victims in a ‘surveillance network’.

While Android P is only in beta stages, NordVPN says Android users may encounter other security holes before the operating system starts to be rolled out to all devices.

Most apps will still have unrestricted access to network activity until at least 2019. From 2019, Android will use a new logic for the way apps access APIs.

“User tracking without their consent undermines basic privacy and security,” comments NordVPN’s CMO, Marty P. Kamden.

“Apps can monitor network activity even without requesting any sensitive permissions. In addition, this privacy hole could easily be exploited for malicious purposes - for example, when user’s browsing history is collected, their online profile can be created.”

He says that Google is responsible for protecting users’ network activity from tracking, but users should also use additional means to safeguard their online privacy. A VPN is one way users can connect to the internet.

NordVPN offers five tips for Android users who want to keep their devices safe.

1. Make sure not to download fake apps – do not click on phishing messages. Original apps from Google Play may have trackers that sell users’ data to advertisers. However, fake apps are even more dangerous.

By implanting fake apps on people’s devices, hackers or even governments can piece together text messages, browsing history, call logs and location data.

Targets can be tracked and their data can be stolen, because they downloaded a fake version of messaging apps like Signal or WhatsApp through phishing messages received on Facebook or WhatsApp.

2. Get serious about passwords. Most Internet users reuse the same password across multiple accounts. Once a hacker is able to read one of a person’s passwords, they would be able to unlock all their devices and read their emails, enter their bank accounts, and so on. The best way to go is one of the password managers that generate and store different passwords for each account.

3. Accept all software updates & security patches. Android devices – same way as Apple – have recently revealed processor vulnerabilities, designed to hack a smartphone. The only way to avoid these Intel, AMD and ARM chip flaws is to update the phone whenever newest patches are released. 

4. Install a VPN. You might have downloaded apps without malware and installed newest security patches, but all your communications and Internet browsing can still be intercepted if you don’t use a VPN. A VPN safely encrypts all information traveling between a device and a VPN server, and is a must on every device, especially if they are using open WiFi networks.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.