Story image

Android apps can track network connections - is it time to use a VPN?

14 May 2018

While Google is finally about to address the problem of apps monitoring network activity, it’s only going to happen on the upcoming version of Android, known as Android P.

For years apps have been able to find out what other apps are connecting to the internet, when they are connecting, and what they are connecting to. While they can’t access the content being transmitted, they can sniff any connection to see if apps are connecting to a certain server, such as a financial institution’s server.

NordVPN says Google Play was filled with hidden trackers, and each downloaded app put victims in a ‘surveillance network’.

While Android P is only in beta stages, NordVPN says Android users may encounter other security holes before the operating system starts to be rolled out to all devices.

Most apps will still have unrestricted access to network activity until at least 2019. From 2019, Android will use a new logic for the way apps access APIs.

“User tracking without their consent undermines basic privacy and security,” comments NordVPN’s CMO, Marty P. Kamden.

“Apps can monitor network activity even without requesting any sensitive permissions. In addition, this privacy hole could easily be exploited for malicious purposes - for example, when user’s browsing history is collected, their online profile can be created.”

He says that Google is responsible for protecting users’ network activity from tracking, but users should also use additional means to safeguard their online privacy. A VPN is one way users can connect to the internet.

NordVPN offers five tips for Android users who want to keep their devices safe.

1. Make sure not to download fake apps – do not click on phishing messages. Original apps from Google Play may have trackers that sell users’ data to advertisers. However, fake apps are even more dangerous.

By implanting fake apps on people’s devices, hackers or even governments can piece together text messages, browsing history, call logs and location data.

Targets can be tracked and their data can be stolen, because they downloaded a fake version of messaging apps like Signal or WhatsApp through phishing messages received on Facebook or WhatsApp.

2. Get serious about passwords. Most Internet users reuse the same password across multiple accounts. Once a hacker is able to read one of a person’s passwords, they would be able to unlock all their devices and read their emails, enter their bank accounts, and so on. The best way to go is one of the password managers that generate and store different passwords for each account.

3. Accept all software updates & security patches. Android devices – same way as Apple – have recently revealed processor vulnerabilities, designed to hack a smartphone. The only way to avoid these Intel, AMD and ARM chip flaws is to update the phone whenever newest patches are released. 

4. Install a VPN. You might have downloaded apps without malware and installed newest security patches, but all your communications and Internet browsing can still be intercepted if you don’t use a VPN. A VPN safely encrypts all information traveling between a device and a VPN server, and is a must on every device, especially if they are using open WiFi networks.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.