Having an outdated Android can be very dangerous!
We have been saying it for a long time, Android, being the most used mobile operating system in the world, is also the one that receives the most attacks! It is not for nothing that there are so many types of malware that, above all, take advantage of the vulnerabilities of previous versions that live in terminals, either due to lack of capacity or due to “incompatibilities” in the approval process. , it cannot be updated, exposing the information of the final consumer.
Although including bloatware and other practices that lead the consumer to have to change the terminal by force are undoubtedly questionable, it is not the central theme of this article, but rather one of the reasons why manufacturers are “handcuffed” to be able to launch updates only in certain markets. . All this is like a snowball that, in the end, for many ends up affecting the security and integrity of the user’s data in a terminal with an outdated version of Android.
These smartphones with old versions of Android are usually easy prey for all kinds of #Malware that, according to their “Modus Operandi” and the risks associated with it, are classified in different ways:
- Unsolicited software (#PUA for Potentially Unwanted Software) that contains advertisements, displays annoying pop-ups or “Pop-Ups” (#Adware), redirects the browser to dubious URLs or sites where software is downloaded to infect the computer further,
- Spy Software or #Spyware that hides “behind the scenes” to steal relevant information from the user,
- Programs that hijack information from the computer known as #Hijacking,
- worms that pass from one terminal to another and reproduce without the need for any interaction on the part of the user,
- Trojans or pieces of malicious software that appear to the user as a seemingly legitimate and harmless program but, when executed, cause damage by creating a backdoor in the terminal that allows remote administration to an unauthorized user to steal data,
- #Rogueware or #Scareware which are malicious codes whose function is to generate alerts about false infections or malfunctions in the system, in order to trick the user into downloading and/or buying dubious applications.
- cryptojacking that, unlike the other threats, seeks to take control of the processing capacity of any device that is connected to the Internet (a computer, a “smart” television, a tablet or smartphone, and even a refrigerator) to mine cryptocurrencies in favor of criminals
But given the complexity of the topic related to Malware, we decided to talk with the experts from Eset Latin America about the different forms or types of Malware, its manifestations or symptoms and even about what can be done to avoid being an easy prey for it. code type. malicious.
Now, given that users of Android 9 or earlier versions with smartphones from more than 4 years ago are the main victims of the scourge of Apps with hidden malicious codes that are like a “wolf in sheep’s clothing” (they appear to be something when they are actually something else), it is worth trying to update the terminal, and if it is not possible, proceed to change it, after all, not only photos, personal and banking information are usually stored on the smartphone, but many times Corporate information.
What can be done with so much Malware out there
Beyond drawing your own conclusions, you must take the necessary precautions at the level of:
- Keep Android OS versions and security patches up to date,
- Avoid installing unnecessary applications and remove unused ones,
- Do not hack the terminal via Root,
- Always protect access to the device by using a PIN or password to unlock the screen.
- Do not use public Wi-Fi networks when carrying out important operations, transmitting confidential data or carrying out transactions,
- Download apps only from Google Play and consider whether the permissions each app requests for installation are really necessary.
- Sometimes it is not enough to download apps from Google Play, you need to verify that they are trustworthy developers by checking their ratings and reviews to determine how trustworthy a developer can be.
- If an app requires you to log in to a social network for an odd reason, it’s best not to proceed until you understand whether or not the reason makes sense.