A malicious application for Android platform is coming soon
According to some sources, a rogue application, which can intercept and redirect e-mails, is coming soon to the Android app store. If this is true, it can cause big trouble to businesses because a large amount of confidential data is being exchanged through e-mails daily. Catalin Cosoi, the head of BitDefender Online Threats Lab thinks that this rogue application will appear by the end of 2011.
According to Cosoi, Android, the Google operating system, has a very weak security system because they don’t test the security feature of their products properly before release. Google makes it easy for developers to work on Android so that their software do good business in the market. But he suggests that Google should first ensure that every Android application is safe for its users before they release it.
He also explained that malicious applications are very easy to create, and it only needs the user's permission to get these apps installed on a device. It is very easy for cyber criminals to make users accept such permissions. They can fool users by posing their malicious apps as productivity software. Once this malicious app gets access to your mailbox, it can make your personal and confidential data vulnerable.
Google did not comment on Cosoi's claim. They just pointed to the Android developer policy page, which states, “To publish your application in Android Market, you first need to register with the service using a Google account and agree to the terms of service. Once you are registered, you can upload your application to the service whenever you want, update it as many times as you want, and then publish it when you are ready. Once published, the users can see your application, download it and rate it.”
Google does not agree with Cosoi's claim that Android has a bad security system. They are convinced that Android operating system is safe and secure to use. Google commented on Android developer site saying, "A central design point of the Android security architecture is that no application, by default, has permission to perform any operation that would adversely impact other applications, the operating system, or the user."
Android has been the main attraction for hackers since its release. Around two-third of the malware created for smartphones are targeted at Android.