website statistics

What new Apple device you are getting?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rated: 5.00/5)

A number of apps store user’s personal data for their use. Most of the times it is authorized by the user and is genuinely required by the app. However, if the app doesn’t properly encrypt the data, it can cause a lot of problems for the user. For instance, now it has been found that the Coollris Android gallery stores unencrypted copies of complete addresses of user. These can be accessed by another malicious app and easily misused.

So how does it exactly work? Android has a ‘sandbox’ where it keeps all the apps. Now when an app requires any user data, Android makes the app ask the user and get explicit permission. If you refuse, the details are not accessed by the app. However, now it has been revealed that if there is a malicious Android app, it can access a whole lot of data without getting permission from the user.

A test app ‘No Permissions’ was created by a mobile security expert Paul Brodeur to test how far an app can gain access into user’s device without seeking permission. The app ‘No Permissions’ was able to scan the device’s storage and reveal the names of all non-hidden files. Moreover, these non-hidden files can also be scanned to reveal any sensitive information contained in them.

Moreover, this app can also get a list of all the installed applications on the device. This can let the app know which apps may have the data it is looking for. Apart from this, the app can gain access to photos, Spotify ID, Google e-mail address and also a list of addresses. This list was gained by the app inside a cache named and inside the cache a file called ‘Chunk_0’. This file is there across a multitude of Android devices.

The fact that all this information is stored unencrypted keeps the doors open for a lot of malicious app and is a huge security issue. Google has taken an initiative to patch up these security holes when it said that it is ‘considering adding a permission for apps to access images.’ But that is just a start and Google needs to do a lot more to make Android security more reliable.

Buy Cheapest Related Product From

Some iPhone 4 User Will Get Free iPhone 4S Replacement

Facebook Acquires Tagtile, A Mobile Loyalty Reward Startup
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On April 15, 2012(3 years, 5 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook