Story image

Android apps can track network connections - is it time to use a VPN?

14 May 18

While Google is finally about to address the problem of apps monitoring network activity, it’s only going to happen on the upcoming version of Android, known as Android P.

For years apps have been able to find out what other apps are connecting to the internet, when they are connecting, and what they are connecting to. While they can’t access the content being transmitted, they can sniff any connection to see if apps are connecting to a certain server, such as a financial institution’s server.

NordVPN says Google Play was filled with hidden trackers, and each downloaded app put victims in a ‘surveillance network’.

While Android P is only in beta stages, NordVPN says Android users may encounter other security holes before the operating system starts to be rolled out to all devices.

Most apps will still have unrestricted access to network activity until at least 2019. From 2019, Android will use a new logic for the way apps access APIs.

“User tracking without their consent undermines basic privacy and security,” comments NordVPN’s CMO, Marty P. Kamden.

“Apps can monitor network activity even without requesting any sensitive permissions. In addition, this privacy hole could easily be exploited for malicious purposes - for example, when user’s browsing history is collected, their online profile can be created.”

He says that Google is responsible for protecting users’ network activity from tracking, but users should also use additional means to safeguard their online privacy. A VPN is one way users can connect to the internet.

NordVPN offers five tips for Android users who want to keep their devices safe.

1. Make sure not to download fake apps – do not click on phishing messages. Original apps from Google Play may have trackers that sell users’ data to advertisers. However, fake apps are even more dangerous.

By implanting fake apps on people’s devices, hackers or even governments can piece together text messages, browsing history, call logs and location data.

Targets can be tracked and their data can be stolen, because they downloaded a fake version of messaging apps like Signal or WhatsApp through phishing messages received on Facebook or WhatsApp.

2. Get serious about passwords. Most Internet users reuse the same password across multiple accounts. Once a hacker is able to read one of a person’s passwords, they would be able to unlock all their devices and read their emails, enter their bank accounts, and so on. The best way to go is one of the password managers that generate and store different passwords for each account.

3. Accept all software updates & security patches. Android devices – same way as Apple – have recently revealed processor vulnerabilities, designed to hack a smartphone. The only way to avoid these Intel, AMD and ARM chip flaws is to update the phone whenever newest patches are released. 

4. Install a VPN. You might have downloaded apps without malware and installed newest security patches, but all your communications and Internet browsing can still be intercepted if you don’t use a VPN. A VPN safely encrypts all information traveling between a device and a VPN server, and is a must on every device, especially if they are using open WiFi networks.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.