TextMirror

 Create a text mirror of any webpage in just a few seconds - for free! Enter the URL:

Mirror: www-computerworld-com-article-3268904-android-android-security-facts-html-2018-04-17

Mirrored: 17th of April 2018, 23:27 Settings: Loading the mirror... Original: www.computerworld.com Views: 43, 43 today

IFRAME: [1]//www.googletagmanager.com/ns.html?GTM-WBVXW9 [2]Close Ad * Don't Miss: * [3]Word 2016 cheat sheet * [4]Best password managers for Android * [5]Mingis on Tech * [6]Resources/White Papers * [7]Job Search * [8]Search * * * * * * (BUTTON) [9]computerworld [INLINE] [10]Sign In | [11]Register Hi! Here are the latest Insider stories. * [12]From the 1800s to now: The world's oldest tech companies * [13]7 questions to ask your EMM provider about GDPR compliance * [14]Q&A: Could blockchain professionalize Gmail? * [15]Advice from a CISO: Blockchain still searching for its tipping point [16]More Insider [17]Sign Out Search for ____________________ Go Suggestions for you Insider email ____________________ * [18]Browsers * [19]Cloud Computing + [20]All Cloud Computing + [21]Cloud Security + [22]Cloud Storage + [23]Hybrid Cloud + [24]Private Cloud + [25]Public Cloud * [26]Computer Hardware + [27]All Computer Hardware + [28]Apple Mac + [29]Chromebooks + [30]Computer Peripherals + [31]PCs + [32]Processors + [33]Solid State Drives * [34]Consumerization of IT + [35]All Consumerization of IT + [36]Bring Your Own Device (BYOD) + [37]Home Tech + [38]Personal Technology * [39]Data Centers + [40]All Data Centers + [41]Data Storage + [42]Disaster Recovery + [43]High-Performance Computing (HPC) + [44]Infrastructure Management + [45]Virtualization * [46]Emerging Technology + [47]All Emerging Technology + [48]3D Printing + [49]Artificial Intelligence + [50]Car Tech + [51]Environment + [52]Internet of Things + [53]Robotics + [54]Space Technology + [55]Wearables * [56]IT Leadership + [57]All IT Leadership + [58]Careers + [59]Digital Transformation + [60]H-1B + [61]Outsourcing + [62]Skills and Training * [63]Internet + [64]All Internet + [65]E-commerce + [66]Search + [67]Social Media + [68]Web Applications * [69]Mobile + [70]All Mobile + [71]Android + [72]Cellular Networks + [73]Mobile Apps + [74]Mobile Payments + [75]Mobile Security + [76]Smartphones + [77]Tablets + [78]Windows Mobile + [79]iOS * [80]Networking + [81]All Networking + [82]Network Security * [83]Operating Systems + [84]All Operating Systems + [85]Chrome OS + [86]Linux + [87]MacOS + [88]Windows * [89]Security + [90]All Security + [91]Application Security + [92]Cyber Crime + [93]Cyberattacks + [94]Encryption + [95]Endpoint Protection + [96]Malware + [97]Privacy * [98]Software + [99]All Software + [100]Analytics + [101]Big Data + [102]Business Intelligence + [103]CRM + [104]Collaboration + [105]Database Management + [106]Desktop Software + [107]Documentation Management + [108]Enterprise Architecture + [109]Java Development + [110]Office Software + [111]Open Source + [112]SaaS + [113]Social Business + [114]Unified Communications * [115]Vertical Industries + [116]All Vertical Industries + [117]Fintech + [118]Government IT + [119]Health Care + [120]Retail * [121]News * [122]Features * [123]Reviews * [124]Blogs * [125]Opinions * [126]Insider * [127]Shark Tank * [128]Slideshows * [129]Video * [130]Digital Magazine * [131]Digital Downloads * [132]Newsletters * [133]Computerworld Events * [134]Resources/White Papers × Close * [135]Home * [136]Mobile * [137]Android [138]JR Raphael [139]Android Intelligence By [140]JR Raphael, Contributing Editor, Computerworld | Apr 17, 2018 9:04 AM PT About | Not your average Android news -- a diverse mix of advice, insight, and analysis with veteran Android journalist JR Raphael. Android Intelligence Analysis Before you panic: 6 things to remember about Android security The next Android security scare will seem a lot less scary with these six critical facts in mind. * [141][LINK] * [142][LINK] * [143][LINK] * [144][LINK] * [145][LINK] * [146][LINK] * [147][LINK] * [148][LINK] * Email a friend To ____________________ Use commas to separate multiple email addresses _______________________________________________________________________________________________________ From ____________________ ____________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ _______________________________________________________________________________________________________ _______________________________________________________________________________________________________ Send [149]Privacy Policy Thank you Your message has been sent. Sorry There was an error emailing this page. Android Security Facts [150]Tumisu, modified by IDG Comm [151](CC0) More like this * [152]Android Trends [153]4 Android trends worth watching in 2018 * [154]Android Underdog [155]The unlikely new Android underdog worth watching * [156]Android evolution - roadmap [157]Android versions: A living history from 1.0 to today * [158]sequence 01.00 00 06 11.still002 Video [159]Mingis on Tech: What's up with Android P? Android Intelligence Analysis * [160]Before you panic: 6 things to remember... * [161]LG's 'Software Upgrade Center' feels... * [162]A midrange Pixel is probably just the... * [163]Google is often its own worst enemy * [164]Google is creating its own Amazon right... * [165]Hold the pitchforks! 2 overlooked... * [166]Android P is a perfect example of why... * [167]Android P in depth: An up-close look at... * [168]Android and the shifting simplicity... * [169]The unlikely new Android underdog worth... Show More Android security sure can seem like a scary subject. And it's no wonder: Every few weeks, we see some new hair-raising headline about how our phones are almost certain to be possessed by demons that'll steal our data, eat our ice cream, and pinch our tenders when we least expect it. This week, it's a series of Android malware monsters known as [170]"ViperRat" and "Desert Scorpion" that has phone-holders everywhere trembling in their bootsies. (Kudos to whoever came up with those spooky-sounding names, by the way. It's an art!) Last week, it was word that Android device-makers might be [171]skipping security updates that had our hands a-shakin'. These sorts of stories can certainly be disconcerting (especially that second one, which is less about the typical malware, directly, and more about a potential act of deception -- "potential" [172]being the key word for now, though). But you know what? From a regular user's perspective, these electrifying tales are almost never cause for alarm. Before the inevitable next Android security scare comes along, take a moment to refresh yourself on six security facts that'll help you breathe a little easier and leave the hyperventilating for something that actually deserves it. [Get fresh tips and insight in your inbox every Friday with JR's new [173]Android Intelligence insider's newsletter. Exclusive extras await!] 1. Android malware can't magically install itself on your phone When we talk about "malware," most people envision a plague-like force that finds its way onto your phone and then sneakily undermines you. But guess what? Even in a worst-case scenario on Android, that just isn't how things work. In order for something to "take over" your Android device -- or do much of anything, really -- you'd first have to manually install it and then grant it access to any relevant permissions. Most of the talk about malware on Android relies on the assumption that the user has done both of those things, be it intentionally or via manipulation. But that's a pretty big assumption to make. [ [174]Take this mobile device management course from PluralSight and learn how to secure devices in your company without degrading the user experience. ] 2. Even if it is somehow installed, Android malware is highly unlikely to be able to access any sensitive data Android works with a system of [175]sandboxing that keeps each app separate from other areas of the device and limits the ways in which it can go beyond those barriers. On enterprise devices, an additional fence is in place to keep personal and company data isolated. According to Android's recently departed security director (whom I interviewed for a story late last year), the vast majority of active Android malware revolves around attempts to make money by abusing advertising, engaging in botnet-like behavior, utilizing clickfraud, or conducting SMS spoofing. Google's latest [176]Android Security Year In Review report, which came out just [177]last month, presents a similar conclusion based on all of Google's internal data from the past year. To put it in simpler terms, Android malware is mostly the terrain of low-level pickpockets who pounce on easy opportunities to snag dangling dollars -- usually indirectly, at that -- and not sophisticated identity thieves who infiltrate their victims' lives. 3. Android security has multiple layers Hearing that your phone might not have the most recent Android security patch is upsetting -- and it should be. Android's monthly security patches absolutely do matter. But they're also a single part of a much bigger Android security picture, one in which no single layer by itself is typically a make-or-break element. Much of Android's security is at its core, with factors like the aforementioned sandboxing along with the platform's permissions system, encryption system, and Verified Boot system. These are the types of areas we see improve with OS updates each year (like with [178]Oreo in 2017 and [179]Android P now -- a perfect example, as I've said before, of [180]why OS updates unequivocally matter). Even by themselves, they make most types of truly damaging "infections" incredibly difficult to achieve. Then there's [181]Google Play Protect, which continously scans the Play Store and your actual device for signs of suspicious behavior (and remains active and up to date independently, without the need for any manufacturer- or carrier-provided rollouts). And yes, that system [182]does occasionally fail, but (a) that happens far less frequently than Android security headlines would lead you to believe -- more on that in a moment -- and (b) such constant challenging and adaption is an inevitable part of any security system. Beyond that, Chrome on Android keeps an eye out for any website-based threats, and Android itself monitors for signs of SMS-based scams and warns you if any such signals are detected. All combined, that brings us to our next point: 4. Your odds of actually encountering Android malware in the real world are almost laughably low I've often said that Android malware tends to be more theoretical than practical, and it's true: Most Android security scare stories fail to take into account all the layers of protection mentioned above and the fact that few, if any, regular people are actually in danger by whatever new threat happens to have come along. There are [183]examples upon [184]examples of this, year after year. And there's a reason, as we'll get into next. First, for perspective: Based on Google's 2017 data, the probability of downloading a "potentially harmful app" from the Play Store is about 0.02%. Less than a tenth of a percent of active Android devices worldwide encountered such a scenario last year. Even for the minority of folks who download apps from sources outside of the Play Store, we're looking at 0.82% of all devices, globally, being affected by any "potentially harmful app" over the last year. And don't forget, too, what we're actually talking about when we discuss these types of apps -- things like the "Gaiaphish" family of malware, which made up the majority of the titles in the most-observed category of "potentially harmful apps" from Google's 2017 report. What does the "Gaiaphish" family do, you might wonder? It "uses Google account authentication tokens on Android devices to fraudulently manipulate parts of Google Play, such as star ratings or comments." THE HORROR. 5. Spreading fear over Android malware is serious business Whenever you see a story about some scary-sounding new Android security threat, take a moment to cross-reference the name of the company behind the research. With rare exception, you'll find it's a company that makes its money by selling -- yup, you guessed it -- security software for Android. That's not to say you shouldn't believe anything the company says because of that, but you absolutely should consider the firm's motivation as part of the context. All of these companies work tirelessly to market security scares on Android because, quite simply, keeping people convinced that Android is scary is what [185]keeps them in business. That's also why their marketing campaigns (and that's ultimately what they are) consistently overplay the risks involved with a threat while downplaying the layers of protection already in place to combat it -- layers that, in most scenarios, make the threats of little real-world concern for the vast majority of Android users. 6. Your own common sense goes a long way in keeping you protected All else aside, basic security hygiene is worth a heck of a lot when it comes to Android security. Look at something before you download it, especially if it's something you haven't heard of anywhere else and that isn't from an obviously reputable source. Look at the reviews. Look at the permissions the app asks for and think about whether they make sense -- and whether you're comfortable providing them. Click the name of the developer and see what else they've created. Unless you really know what you're doing, don't download apps from random websites or other unestablished third-party sources. Don't accept requests for permissions without understanding what they're asking. And if you ever see a prompt asking you to install something you don't recognize, don't authorize it. I've said it before, and I'll say it again: With all due respect to the dodos of the world, it doesn't take a rocket scientist to stick with reputable-looking apps and avoid questionable creations. Bonus: 4 questions to ask every time you see an Android security story I'll end with a short series of questions I came up with a while back to help evaluate any Android security story. The questions are incredibly effective and will save you countless hours of undue stress. Ready? 1. Who's behind the "research" driving this story, and what is their motivation? 2. Is this threat related to something I'm likely to download and install, or does it revolve around some weird random app no normal person would ever encounter? 3. On the off-chance that I did somehow install the trigger, would my phone automatically protect me from anything harmful? 4. Has any normal user actually been affected by this in the real world? Think through those questions carefully -- and make sure you're always keeping up with your own [186]Android security hygiene -- and you'll find there's rarely a reason to exert much energy, no matter how much huffing and puffing the latest Android malware monster may attempt. Sign up for [187]JR's new weekly newsletter to get this column along with bonus tips, personal recommendations, and other exclusive extras delivered to your inbox. [188]AI Newsletter [[189]Android Intelligence videos at Computerworld] Related: * [190]Android * [191]Security * [192]Mobile * [193]Mobile Security Contributing Editor [194]JR Raphael serves up tasty morsels about the human side of technology. Hungry for more? Join him [195]on Twitter or sign up for [196]his weekly newsletter to get fresh tips and insight in your inbox every Friday. Follow * * * * [197]5 tips for working with SharePoint Online Android Intelligence Analysis [198]Android Security Facts Currently reading [199]Before you panic: 6 things to remember about Android... [200]LG Software Upgrade Center Android [201]LG's 'Software Upgrade Center' feels slightly too familiar [202]Midrange Pixel Phone - Google - CC0 image by JosepMonter modified by JR Raphael [203]A midrange Pixel is probably just the tip of the iceberg [204]Google Enemy [205]Google is often its own worst enemy [206]Google Amazon [207]Google is creating its own Amazon right under our noses [208]Android Upgrade Perspective [209]Hold the pitchforks! 2 overlooked realities about Android... [210]Android P OS Updates [211]Android P is a perfect example of why OS updates still... [212]Android P Security [213]Android P in depth: An up-close look at what's new with... [214]Android Simplicity [215]Android and the shifting simplicity spectrum [216]Android Underdog [217]The unlikely new Android underdog worth watching [218]Android Upgrade Downslide [219]Android upgrade downslide: 4 years of damning data in 3... [220]Android Upgrade Report Card: Oreo [221]Android Upgrade Report Card: Grading the manufacturers on... [222]Google Beta Android P Feature [223]Google's latest beta hints at what should be a key Android... [224]Virtual Assistant Battle [225]What the virtual assistant battle is really all about, in a... [226]Android P Rumors [227]5 missing footnotes from those Android P rumors [228]Samsung Galaxy S9 [229]Galaxy S9 and the elephant in the room with Samsung's... [230]LG Smartphone Release Cycle [231]LG's super-fantastic, industry-shifting idea* [232]Post-OS World [233]Welcome to the post-OS era [234]Android Narratives Skepticism 2018 [235]8 Android narratives to approach with skepticism in 2018 [236]Android Trends [237]4 Android trends worth watching in 2018 [238]Google Play Protect [239]When Google Play Protect fails [240]Google Ecosystem [241]Welcome to the era of the Google ecosystem [242]Google Pixel 2 [243]Google's Pixel 2 embraces the reality everyone else is... [244]Google Feed, Google Now [245]The Google feed has lost its soul [246]Google HTC Deal Pixel Phone [247]Google's HTC deal won't solve its biggest Pixel problem [248]Android Notification Snoozing [249]What Android's notification snoozing needs next [250]iOS 11 vs Android 8 [251]iOS 11 vs. Android 8.0: Which is better? Well... [252]Android One - Google [253]How Android One could complete Google's grand Android plan [254]Android Upgrade [255]The massive Android upgrade you probably didn't notice [256]Google Play Protect: Android Security [257]The big secret behind Google Play Protect on Android [258]Apple Android Upgrade Comparisons [259]Apple's Android upgrade jabs come with a critical caveat [260]Google Android Upgrades - Project Treble [261]2 big asterisks to Google's Android upgrade fix [262]YouTube Music, Google Play Music [263]16 months later, YouTube Music is still a missed opportunity [264]Android Upgrade Problem Answer [265]What's the answer to Android's upgrade problem? [266]Android Upgrade Problem [267]The ugly truth behind Android's upgrade problem [268]Android Wear 2.0 - LG Watch Sport LTE [269]One more time: An LTE smartwatch is a stupid idea [270]Android App Design [271]The unlikely company behind Android's most improved app [272]Google Messaging Apps [273]Google desperately needs a simple messaging strategy [274]Android 7.1 App Shortcuts [275]Android's App Shortcuts are held back by Apple's influence [276]Google Assistant, Google Home [277]What Google Assistant needs is clarity -- and consistency [278]Google Pixel Phone [279]Google's Pixel phone is much more than the sum of its parts [280]Google Allo [281]Google's Allo is a solution in search of a problem [282]Android Old Habits [283]Android is slowly sliding back into old bad habits [284]Android 7.0 Nougat [285]Android 7.0, Nougat: The complete FAQ [286]Broken Android Phone [287]My wife's broken Android phone made me strangely happy [288]Next Smartphone Purchase [289]The most important thing to consider in your next... [290]motorola polaroid of android [291]Motorola has become the Polaroid of Android [292]Android Security Flaw [293]Behind the scenes: The anatomy of an Android security flaw [294]Android Malware Monster [295]The Android malware monster will never die [296]Google Keep [297]3 years with Google Keep: Where it shines and where it... [298]2013 Android Phone [299]A step back in time: Going back to my 2013 Android phone... You Might Like Shop Tech Products at Amazon Sponsored Links * [300]INSTANTLY dtSearch® TERABYTES of FILE+EMAIL+DB+WEB DATA; reviews & evals * [301]Online Master of Science in Information Systems at Northwestern University [302]Computerworld The Voice of Business Technology Follow us * * * * * * [303]Browsers * [304]Cloud Computing * [305]Computer Hardware * [306]Consumerization of IT * [307]Data Centers * [308]Emerging Technology * [309]IT Leadership * [310]Internet * [311]Mobile * [312]Networking * [313]Operating Systems * [314]Security * [315]Software * [316]Vertical Industries * [317]News * [318]Features * [319]Reviews * [320]Blogs * [321]Opinions * [322]Insider * [323]Shark Tank * [324]Slideshows * [325]Video * [326]Newsletters * [327]Computerworld Events * [328]Resources/White Papers * [329]About Us * [330]Contact * [331]Privacy Policies * [332]Editorial Beats * [333]Advertising * [334]Careers at IDG * [335]Ad Choices * [336]E-commerce Affiliate Relationships [337]Copyright © 2018 IDG Communications, Inc. Explore the IDG Network descend * [338]CIO * [339]Computerworld * [340]CSO * [341]GameStar * [342]Greenbot * [343]IDC * [344]IDG * [345]IDG Connect * [346]IDG TechNetwork * [347]IDG.TV * [348]IDG Ventures * [349]Infoworld * [350]IT News * [351]ITwhitepapers * [352]ITworld * [353]JavaWorld * [354]LinuxWorld * [355]Macworld * [356]Network World * [357]PCWorld * [358]TechConnect * [359]TechHive IFRAME: [360]__bkframe [INLINE] References Visible links 1. https://www.googletagmanager.com/ns.html?GTM-WBVXW9 2. javascript:unhide('superadunit'); 3. https://www.computerworld.com/article/3240544/office-software/word-2016-cheat-sheet.html 4. https://www.computerworld.com/article/3267964/android/best-password-managers-android.html 5. https://www.computerworld.com/video/series/8401/mingis-on-tech 6. https://www.computerworld.com/resources 7. https://www.computerworld.com/jobs 8. https://www.computerworld.com/article/3268904/android/android-security-facts.html#search 9. https://www.computerworld.com/ 10. javascript:/// 11. javascript:/// 12. https://www.computerworld.com/article/3269010/it-industry/from-the-1800s-to-now-the-worlds-oldest-tech-companies.html 13. https://www.computerworld.com/article/3267701/mobile-wireless/7-questions-to-ask-your-emm-provider-about-gdpr-compliance.html 14. https://www.computerworld.com/article/3266589/blockchain/qa-could-blockchain-professionalize-gmail.html 15. https://www.computerworld.com/article/3266666/blockchain/advice-from-a-ciso-blockchain-still-searching-for-its-tipping-point.html 16. https://www.computerworld.com/insider/ 17. javascript:/// 18. https://www.computerworld.com/category/web-browsers/ 19. https://www.computerworld.com/category/cloud-computing/ 20. https://www.computerworld.com/category/cloud-computing/ 21. https://www.computerworld.com/category/cloud-security/ 22. https://www.computerworld.com/category/cloud-storage/ 23. https://www.computerworld.com/category/hybrid-cloud/ 24. https://www.computerworld.com/category/private-cloud/ 25. https://www.computerworld.com/category/public-cloud/ 26. https://www.computerworld.com/category/computer-hardware/ 27. https://www.computerworld.com/category/computer-hardware/ 28. https://www.computerworld.com/category/apple-mac/ 29. https://www.computerworld.com/category/chromebooks/ 30. https://www.computerworld.com/category/computer-peripherals/ 31. https://www.computerworld.com/category/windows-pcs/ 32. https://www.computerworld.com/category/computer-processors/ 33. https://www.computerworld.com/category/solid-state-drives/ 34. https://www.computerworld.com/category/consumerization-of-it/ 35. https://www.computerworld.com/category/consumerization-of-it/ 36. https://www.computerworld.com/category/byod/ 37. https://www.computerworld.com/category/home-tech/ 38. https://www.computerworld.com/category/personal-technology/ 39. https://www.computerworld.com/category/data-center/ 40. https://www.computerworld.com/category/data-center/ 41. https://www.computerworld.com/category/data-storage-solutions/ 42. https://www.computerworld.com/category/disaster-recovery/ 43. https://www.computerworld.com/category/high-performance-computing/ 44. https://www.computerworld.com/category/infrastructure-management/ 45. https://www.computerworld.com/category/virtualization/ 46. https://www.computerworld.com/category/emerging-technology/ 47. https://www.computerworld.com/category/emerging-technology/ 48. https://www.computerworld.com/category/3d-printing/ 49. https://www.computerworld.com/category/artificial-intelligence/ 50. https://www.computerworld.com/category/car-tech/ 51. https://www.computerworld.com/category/environment/ 52. https://www.computerworld.com/category/internet-of-things/ 53. https://www.computerworld.com/category/robotics/ 54. https://www.computerworld.com/category/space-technology/ 55. https://www.computerworld.com/category/wearables/ 56. https://www.computerworld.com/category/it-management/ 57. https://www.computerworld.com/category/it-management/ 58. https://www.computerworld.com/category/it-careers/ 59. https://www.computerworld.com/category/digital-transformation/ 60. https://www.computerworld.com/category/h1b/ 61. https://www.computerworld.com/category/it-outsourcing/ 62. https://www.computerworld.com/category/it-skills-training/ 63. https://www.computerworld.com/category/internet/ 64. https://www.computerworld.com/category/internet/ 65. https://www.computerworld.com/category/e-commerce/ 66. https://www.computerworld.com/category/search/ 67. https://www.computerworld.com/category/social-media/ 68. https://www.computerworld.com/category/web-apps/ 69. https://www.computerworld.com/category/mobile-wireless/ 70. https://www.computerworld.com/category/mobile-wireless/ 71. https://www.computerworld.com/category/android/ 72. https://www.computerworld.com/category/cellular-networks/ 73. https://www.computerworld.com/category/mobile-apps/ 74. https://www.computerworld.com/category/mobile-payments/ 75. https://www.computerworld.com/category/mobile-security/ 76. https://www.computerworld.com/category/smartphones/ 77. https://www.computerworld.com/category/tablets/ 78. https://www.computerworld.com/category/windows-phone-os/ 79. https://www.computerworld.com/category/apple-ios/ 80. https://www.computerworld.com/category/networking/ 81. https://www.computerworld.com/category/networking/ 82. https://www.computerworld.com/category/network-security/ 83. https://www.computerworld.com/category/operating-systems/ 84. https://www.computerworld.com/category/operating-systems/ 85. https://www.computerworld.com/category/chrome-os/ 86. https://www.computerworld.com/category/linux/ 87. https://www.computerworld.com/category/mac-os-x/ 88. https://www.computerworld.com/category/microsoft-windows/ 89. https://www.computerworld.com/category/security/ 90. https://www.computerworld.com/category/security/ 91. https://www.computerworld.com/category/application-security/ 92. https://www.computerworld.com/category/cybercrime-hacking/ 93. https://www.computerworld.com/category/cyberattacks/ 94. https://www.computerworld.com/category/encryption/ 95. https://www.computerworld.com/category/endpoint-security/ 96. https://www.computerworld.com/category/malware-vulnerabilities/ 97. https://www.computerworld.com/category/data-privacy/ 98. https://www.computerworld.com/category/enterprise-applications/ 99. https://www.computerworld.com/category/enterprise-applications/ 100. https://www.computerworld.com/category/data-analytics/ 101. https://www.computerworld.com/category/big-data/ 102. https://www.computerworld.com/category/business-intelligence/ 103. https://www.computerworld.com/category/crm/ 104. https://www.computerworld.com/category/collaboration/ 105. https://www.computerworld.com/category/database-management/ 106. https://www.computerworld.com/category/desktop-apps/ 107. https://www.computerworld.com/category/documentation-management/ 108. https://www.computerworld.com/category/enterprise-architecture/ 109. https://www.computerworld.com/category/java-development/ 110. https://www.computerworld.com/category/office-software/ 111. https://www.computerworld.com/category/open-source-tools/ 112. https://www.computerworld.com/category/software-as-a-service/ 113. https://www.computerworld.com/category/social-business/ 114. https://www.computerworld.com/category/unified-communications/ 115. https://www.computerworld.com/category/vertical-it/ 116. https://www.computerworld.com/category/vertical-it/ 117. https://www.computerworld.com/category/financial-it/ 118. https://www.computerworld.com/category/government-it/ 119. https://www.computerworld.com/category/healthcare-it/ 120. https://www.computerworld.com/category/retail-it/ 121. https://www.computerworld.com/news/ 122. https://www.computerworld.com/feature/ 123. https://www.computerworld.com/reviews/ 124. https://www.computerworld.com/blogs/ 125. https://www.computerworld.com/opinion/ 126. https://www.computerworld.com/insider/ 127. https://www.computerworld.com/blog/shark-tank/ 128. https://www.computerworld.com/slideshows/ 129. https://www.computerworld.com/video/ 130. https://www.computerworld.com/tag/computerworlddigitalmagazine/ 131. https://www.computerworld.com/resources/download-library 132. https://www.computerworld.com/newsletters/signup.html 133. http://www.ereg.me/IDGEvents 134. https://www.computerworld.com/resources/ 135. https://www.computerworld.com/ 136. https://www.computerworld.com/category/mobile-wireless/ 137. https://www.computerworld.com/category/android/ 138. https://www.computerworld.com/author/JR-Raphael/ 139. https://www.computerworld.com/blog/android-intelligence/ 140. https://www.computerworld.com/author/JR-Raphael/ 141. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3268904%2Fandroid%2Fandroid-security-facts.html&via=computerworld&text=Before+you+panic%3A+6+things+to+remember+about+Android+security 142. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3268904%2Fandroid%2Fandroid-security-facts.html 143. http://www.linkedin.com/shareArticle?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3268904%2Fandroid%2Fandroid-security-facts.html&title=Before+you+panic%3A+6+things+to+remember+about+Android+security 144. https://plus.google.com/share?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3268904%2Fandroid%2Fandroid-security-facts.html 145. http://reddit.com/submit?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3268904%2Fandroid%2Fandroid-security-facts.html&title=Before+you+panic%3A+6+things+to+remember+about+Android+security 146. http://www.stumbleupon.com/submit?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3268904%2Fandroid%2Fandroid-security-facts.html 147. https://www.computerworld.com/article/3268904/android/android-security-facts.html#email 148. javascript:window.print(); 149. https://www.computerworld.com/about/privacy.html 150. https://pixabay.com/en/emoji-scared-emoticon-expression-2009486/ 151. https://creativecommons.org/publicdomain/zero/1.0/ 152. https://www.computerworld.com/article/3245532/android/android-trends.html 153. https://www.computerworld.com/article/3245532/android/android-trends.html 154. https://www.computerworld.com/article/3259526/android/android-underdog.html 155. https://www.computerworld.com/article/3259526/android/android-underdog.html 156. https://www.computerworld.com/article/3235946/android/android-versions-a-living-history-from-1-0-to-today.html 157. https://www.computerworld.com/article/3235946/android/android-versions-a-living-history-from-1-0-to-today.html 158. https://www.computerworld.com/video/85975/mingis-on-tech-whats-up-with-android-p 159. https://www.computerworld.com/video/85975/mingis-on-tech-whats-up-with-android-p 160. https://www.computerworld.com/article/3268904/android/android-security-facts.html 161. https://www.computerworld.com/article/3268610/android/lg-software-upgrade-center-android.html 162. https://www.computerworld.com/article/3267809/android/midrange-pixel-phone-google.html 163. https://www.computerworld.com/article/3265051/android/google-is-often-its-own-worst-enemy.html 164. https://www.computerworld.com/article/3264429/mobile-wireless/google-amazon.html 165. https://www.computerworld.com/article/3262947/android/android-upgrades.html 166. https://www.computerworld.com/article/3262133/android/android-p.html 167. https://www.computerworld.com/article/3261464/android/android-p-security.html 168. https://www.computerworld.com/article/3260685/android/android-simplicity-spectrum.html 169. https://www.computerworld.com/article/3259526/android/android-underdog.html 170. https://arstechnica.com/information-technology/2018/04/malicious-apps-in-google-play-gave-attackers-considerable-control-of-phones/ 171. https://www.wired.com/story/android-phones-hide-missed-security-updates-from-you 172. https://www.androidcentral.com/editors-desk-security-signal-and-noise 173. https://www.androidintel.net/subscribe 174. https://pluralsight.pxf.io/c/321564/424552/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fcourses%2Fmobile-device-management-big-picture 175. https://developer.android.com/training/articles/security-tips.html 176. https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf 177. https://security.googleblog.com/2018/03/android-security-2017-year-in-review.html 178. https://www.computerworld.com/article/3220446/android/android-8-oreo-security.html 179. https://www.computerworld.com/article/3261464/android/android-p-security.html 180. https://www.computerworld.com/article/3262133/android/android-p.html 181. https://www.computerworld.com/article/3210587/android/google-play-protect-android.html 182. https://www.computerworld.com/article/3236194/android/google-play-protect.html 183. https://www.computerworld.com/article/3105569/android/android-quadrooter.html 184. https://www.computerworld.com/article/3027231 185. https://www.csoonline.com/article/3235521/android/best-android-security-app-why-youre-asking-the-wrong-question.html 186. https://www.computerworld.com/article/3012630/android/android-security.html 187. https://www.androidintel.net/subscribe 188. https://www.androidintel.net/subscribe 189. https://www.computerworld.com/video/series/8536/android 190. https://www.computerworld.com/category/android 191. https://www.computerworld.com/category/security 192. https://www.computerworld.com/category/mobile-wireless 193. https://www.computerworld.com/category/mobile-security 194. https://www.jrstart.com/ 195. https://twitter.com/jrraphael 196. https://www.androidintel.net/subscribe 197. https://www.computerworld.com/article/3257650/collaboration/5-tips-for-working-with-sharepoint-online.html#tk.ctw-inflr 198. https://www.computerworld.com/article/3268904/android/android-security-facts.html 199. https://www.computerworld.com/article/3268904/android/android-security-facts.html 200. https://www.computerworld.com/article/3268610/android/lg-software-upgrade-center-android.html 201. https://www.computerworld.com/article/3268610/android/lg-software-upgrade-center-android.html 202. https://www.computerworld.com/article/3267809/android/midrange-pixel-phone-google.html 203. https://www.computerworld.com/article/3267809/android/midrange-pixel-phone-google.html 204. https://www.computerworld.com/article/3265051/android/google-is-often-its-own-worst-enemy.html 205. https://www.computerworld.com/article/3265051/android/google-is-often-its-own-worst-enemy.html 206. https://www.computerworld.com/article/3264429/mobile-wireless/google-amazon.html 207. https://www.computerworld.com/article/3264429/mobile-wireless/google-amazon.html 208. https://www.computerworld.com/article/3262947/android/android-upgrades.html 209. https://www.computerworld.com/article/3262947/android/android-upgrades.html 210. https://www.computerworld.com/article/3262133/android/android-p.html 211. https://www.computerworld.com/article/3262133/android/android-p.html 212. https://www.computerworld.com/article/3261464/android/android-p-security.html 213. https://www.computerworld.com/article/3261464/android/android-p-security.html 214. https://www.computerworld.com/article/3260685/android/android-simplicity-spectrum.html 215. https://www.computerworld.com/article/3260685/android/android-simplicity-spectrum.html 216. https://www.computerworld.com/article/3259526/android/android-underdog.html 217. https://www.computerworld.com/article/3259526/android/android-underdog.html 218. https://www.computerworld.com/article/3258825/android/android-upgrade-downslide.html 219. https://www.computerworld.com/article/3258825/android/android-upgrade-downslide.html 220. https://www.computerworld.com/article/3257607/android/android-upgrade-report-card-oreo.html 221. https://www.computerworld.com/article/3257607/android/android-upgrade-report-card-oreo.html 222. https://www.computerworld.com/article/3256156/android/google-beta-android-p-feature.html 223. https://www.computerworld.com/article/3256156/android/google-beta-android-p-feature.html 224. https://www.computerworld.com/article/3252259/artificial-intelligence/virtual-assistant-battle.html 225. https://www.computerworld.com/article/3252259/artificial-intelligence/virtual-assistant-battle.html 226. https://www.computerworld.com/article/3254750/android/android-p-rumors.html 227. https://www.computerworld.com/article/3254750/android/android-p-rumors.html 228. https://www.computerworld.com/article/3252032/android/galaxy-s9-samsung-android-phones.html 229. https://www.computerworld.com/article/3252032/android/galaxy-s9-samsung-android-phones.html 230. https://www.computerworld.com/article/3247832/android/lg-smartphone-release-cycle.html 231. https://www.computerworld.com/article/3247832/android/lg-smartphone-release-cycle.html 232. https://www.computerworld.com/article/3247244/artificial-intelligence/post-os-era.html 233. https://www.computerworld.com/article/3247244/artificial-intelligence/post-os-era.html 234. https://www.computerworld.com/article/3245733/android/android-narratives-skepticism-2018.html 235. https://www.computerworld.com/article/3245733/android/android-narratives-skepticism-2018.html 236. https://www.computerworld.com/article/3245532/android/android-trends.html 237. https://www.computerworld.com/article/3245532/android/android-trends.html 238. https://www.computerworld.com/article/3236194/android/google-play-protect.html 239. https://www.computerworld.com/article/3236194/android/google-play-protect.html 240. https://www.computerworld.com/article/3233300/mobile-wireless/google-ecosystem.html 241. https://www.computerworld.com/article/3233300/mobile-wireless/google-ecosystem.html 242. https://www.computerworld.com/article/3230148/smartphones/google-pixel-2.html 243. https://www.computerworld.com/article/3230148/smartphones/google-pixel-2.html 244. https://www.computerworld.com/article/3229933/mobile-wireless/google-feed.html 245. https://www.computerworld.com/article/3229933/mobile-wireless/google-feed.html 246. https://www.computerworld.com/article/3226477/smartphones/google-htc-deal-pixel-phone.html 247. https://www.computerworld.com/article/3226477/smartphones/google-htc-deal-pixel-phone.html 248. https://www.computerworld.com/article/3225350/android/android-notification-snoozing.html 249. https://www.computerworld.com/article/3225350/android/android-notification-snoozing.html 250. https://www.computerworld.com/article/3223076/mobile-wireless/ios-11-vs-android-8.html 251. https://www.computerworld.com/article/3223076/mobile-wireless/ios-11-vs-android-8.html 252. https://www.computerworld.com/article/3159068/android/android-one-google.html 253. https://www.computerworld.com/article/3159068/android/android-one-google.html 254. https://www.computerworld.com/article/3216104/android/android-upgrade.html 255. https://www.computerworld.com/article/3216104/android/android-upgrade.html 256. https://www.computerworld.com/article/3210587/android/google-play-protect-android.html 257. https://www.computerworld.com/article/3210587/android/google-play-protect-android.html 258. https://www.computerworld.com/article/3199824/android/apple-android-ios-upgrades-wwdc-2017.html 259. https://www.computerworld.com/article/3199824/android/apple-android-ios-upgrades-wwdc-2017.html 260. https://www.computerworld.com/article/3196830/android/google-android-upgrades-project-treble.html 261. https://www.computerworld.com/article/3196830/android/google-android-upgrades-project-treble.html 262. https://www.computerworld.com/article/3180405/android/youtube-music.html 263. https://www.computerworld.com/article/3180405/android/youtube-music.html 264. https://www.computerworld.com/article/3176516/android/android-upgrade-problem-answer.html 265. https://www.computerworld.com/article/3176516/android/android-upgrade-problem-answer.html 266. https://www.computerworld.com/article/3175067/android/android-upgrade-problem.html 267. https://www.computerworld.com/article/3175067/android/android-upgrade-problem.html 268. https://www.computerworld.com/article/3167904/wearables/android-wear-20-lte-smartwatch.html 269. https://www.computerworld.com/article/3167904/wearables/android-wear-20-lte-smartwatch.html 270. https://www.computerworld.com/article/3163125/android/android-most-improved-app.html 271. https://www.computerworld.com/article/3163125/android/android-most-improved-app.html 272. https://www.computerworld.com/article/3160587/mobile-wireless/google-messaging-apps.html 273. https://www.computerworld.com/article/3160587/mobile-wireless/google-messaging-apps.html 274. https://www.computerworld.com/article/3141644/android/android-app-shortcuts.html 275. https://www.computerworld.com/article/3141644/android/android-app-shortcuts.html 276. https://www.computerworld.com/article/3138045/android/google-assistant-clarity-consistency.html 277. https://www.computerworld.com/article/3138045/android/google-assistant-clarity-consistency.html 278. https://www.computerworld.com/article/3132428/android/google-pixel-phone.html 279. https://www.computerworld.com/article/3132428/android/google-pixel-phone.html 280. https://www.computerworld.com/article/3123073/mobile-wireless/google-allo.html 281. https://www.computerworld.com/article/3123073/mobile-wireless/google-allo.html 282. https://www.computerworld.com/article/3120411/android/android-old-habits.html 283. https://www.computerworld.com/article/3120411/android/android-old-habits.html 284. https://www.computerworld.com/article/3110607/android/android-70-nougat-faq.html 285. https://www.computerworld.com/article/3110607/android/android-70-nougat-faq.html 286. https://www.computerworld.com/article/3100717/android/broken-android-phone.html 287. https://www.computerworld.com/article/3100717/android/broken-android-phone.html 288. https://www.computerworld.com/article/3098674/android/next-smartphone-purchase.html 289. https://www.computerworld.com/article/3098674/android/next-smartphone-purchase.html 290. https://www.computerworld.com/article/3096965/android/motorola-polaroid-of-android.html 291. https://www.computerworld.com/article/3096965/android/motorola-polaroid-of-android.html 292. https://www.computerworld.com/article/3047225/android/android-security-flaw.html 293. https://www.computerworld.com/article/3047225/android/android-security-flaw.html 294. https://www.computerworld.com/article/3027231/android/android-malware-monster.html 295. https://www.computerworld.com/article/3027231/android/android-malware-monster.html 296. https://www.computerworld.com/article/3026239/android/google-keep-3-years.html 297. https://www.computerworld.com/article/3026239/android/google-keep-3-years.html 298. https://www.computerworld.com/article/3102893/android/2013-android-phone.html 299. https://www.computerworld.com/article/3102893/android/2013-android-phone.html 300. http://pubads.g.doubleclick.net/gampad/clk?id=4516337039&iu=/8456/IDG.US_E_ComputerWorld.com 301. http://pubads.g.doubleclick.net/gampad/clk?id=4528359261&iu=/8456/IDG.US_E_ComputerWorld.com 302. https://www.computerworld.com/ 303. https://www.computerworld.com/category/web-browsers/ 304. https://www.computerworld.com/category/cloud-computing/ 305. https://www.computerworld.com/category/computer-hardware/ 306. https://www.computerworld.com/category/consumerization-of-it/ 307. https://www.computerworld.com/category/data-center/ 308. https://www.computerworld.com/category/emerging-technology/ 309. https://www.computerworld.com/category/it-management/ 310. https://www.computerworld.com/category/internet/ 311. https://www.computerworld.com/category/mobile-wireless/ 312. https://www.computerworld.com/category/networking/ 313. https://www.computerworld.com/category/operating-systems/ 314. https://www.computerworld.com/category/security/ 315. https://www.computerworld.com/category/enterprise-applications/ 316. https://www.computerworld.com/category/vertical-it/ 317. https://www.computerworld.com/news 318. https://www.computerworld.com/feature 319. https://www.computerworld.com/reviews 320. https://www.computerworld.com/blogs 321. https://www.computerworld.com/opinion 322. https://www.computerworld.com/insider 323. https://www.computerworld.com/blog/shark-tank 324. https://www.computerworld.com/slideshows 325. https://www.computerworld.com/video 326. https://www.computerworld.com/newsletters/signup.html 327. http://www.ereg.me/IDGEvents 328. https://www.computerworld.com/resources 329. https://www.computerworld.com/about/about.html 330. https://www.computerworld.com/about/contactus.html 331. https://www.computerworld.com/about/privacy.html 332. https://www.computerworld.com/about/editorial.html#newsbeats 333. https://www.idgenterprise.com/reach/computerworld/ 334. https://www.idg.com/work-here/ 335. https://www.computerworld.com/about/adchoices.html 336. https://www.computerworld.com/about/affiliates.html 337. https://www.computerworld.com/about/copyright.html 338. https://www.cio.com/ 339. https://www.computerworld.com/ 340. https://www.csoonline.com/ 341. https://www.gamestar.com/ 342. https://www.greenbot.com/ 343. https://www.idc.com/ 344. https://www.idg.com/ 345. https://www.idgconnect.com/ 346. https://www.idgtechnetwork.com/ 347. https://www.idg.tv/ 348. https://www.idgventures.com/ 349. https://www.infoworld.com/ 350. https://www.itnews.com/ 351. https://www.itwhitepapers.com/ 352. https://www.itworld.com/ 353. https://www.javaworld.com/ 354. https://www.linuxworld.com/ 355. https://www.macworld.com/ 356. https://www.networkworld.com/ 357. https://www.pcworld.com/ 358. https://www.techconnect.com/ 359. https://www.techhive.com/ 360. javascript:void(0) Hidden links: 362. https://twitter.com/computerworld 363. https://www.linkedin.com/company/computerworld 364. https://www.facebook.com/Computerworld 365. https://plus.google.com/+computerworld/posts 366. https://www.computerworld.com/index.rss 367. https://www.computerworld.com/learn-about-insider/ 368. https://www.computerworld.com/blog/android-intelligence/index.rss 369. https://www.computerworld.com/article/3268904/android/android-security-facts.html 370. https://www.computerworld.com/article/3268904/android/android-security-facts.html 371. https://www.computerworld.com/article/3268904/android/android-security-facts.html 372. https://www.computerworld.com/video/85975/mingis-on-tech-whats-up-with-android-p 373. https://www.computerworld.com/author/JR-Raphael/ 374. https://twitter.com/JRRaphael 375. http://google.com/+JRRaphael 376. https://www.computerworld.com/author/JR-Raphael/index.rss 377. https://twitter.com/computerworld 378. https://www.linkedin.com/company/computerworld 379. https://www.facebook.com/Computerworld 380. https://plus.google.com/+computerworld/posts 381. https://www.computerworld.com/index.rss

Recent mirrors


im9 Image Hosting   » Images up to 9 MB, hotlinking & +18 images allowed - all that and much more for free!