Story image

Android apps can track network connections - is it time to use a VPN?

14 May 2018

While Google is finally about to address the problem of apps monitoring network activity, it’s only going to happen on the upcoming version of Android, known as Android P.

For years apps have been able to find out what other apps are connecting to the internet, when they are connecting, and what they are connecting to. While they can’t access the content being transmitted, they can sniff any connection to see if apps are connecting to a certain server, such as a financial institution’s server.

NordVPN says Google Play was filled with hidden trackers, and each downloaded app put victims in a ‘surveillance network’.

While Android P is only in beta stages, NordVPN says Android users may encounter other security holes before the operating system starts to be rolled out to all devices.

Most apps will still have unrestricted access to network activity until at least 2019. From 2019, Android will use a new logic for the way apps access APIs.

“User tracking without their consent undermines basic privacy and security,” comments NordVPN’s CMO, Marty P. Kamden.

“Apps can monitor network activity even without requesting any sensitive permissions. In addition, this privacy hole could easily be exploited for malicious purposes - for example, when user’s browsing history is collected, their online profile can be created.”

He says that Google is responsible for protecting users’ network activity from tracking, but users should also use additional means to safeguard their online privacy. A VPN is one way users can connect to the internet.

NordVPN offers five tips for Android users who want to keep their devices safe.

1. Make sure not to download fake apps – do not click on phishing messages. Original apps from Google Play may have trackers that sell users’ data to advertisers. However, fake apps are even more dangerous.

By implanting fake apps on people’s devices, hackers or even governments can piece together text messages, browsing history, call logs and location data.

Targets can be tracked and their data can be stolen, because they downloaded a fake version of messaging apps like Signal or WhatsApp through phishing messages received on Facebook or WhatsApp.

2. Get serious about passwords. Most Internet users reuse the same password across multiple accounts. Once a hacker is able to read one of a person’s passwords, they would be able to unlock all their devices and read their emails, enter their bank accounts, and so on. The best way to go is one of the password managers that generate and store different passwords for each account.

3. Accept all software updates & security patches. Android devices – same way as Apple – have recently revealed processor vulnerabilities, designed to hack a smartphone. The only way to avoid these Intel, AMD and ARM chip flaws is to update the phone whenever newest patches are released. 

4. Install a VPN. You might have downloaded apps without malware and installed newest security patches, but all your communications and Internet browsing can still be intercepted if you don’t use a VPN. A VPN safely encrypts all information traveling between a device and a VPN server, and is a must on every device, especially if they are using open WiFi networks.

Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
Red Box gains compliance boost with new partnership
By partnering with Global Relay, voice platform provider Red Box is improving the security of its offerings for high-value and risk voice data.