Loading

Malicious Android Applications in market place: How Do We Fix It?
Prakash Waghamode1, Vilas Gaikwad2, Pravin Kamble3
1Prakash Waghamode, Department of Computer Science and Engineering,  and Technology Institute, Panhala, Maharashtra, India.
2Vilas Gaikwad, Department of Computer Science and Engineering,  and Technology Institute, Panhala, Maharashtra, India.
3Pravin Kamble, Department of Computer Science and Engineering, and Technology Institute, Panhala, Maharashtra, India.
Manuscript received on March 12, 2013. | Revised Manuscript received on April 14, 2013. | Manuscript published on April 30, 2013. | PP: 896-899 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1554042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Android Smartphone applications are getting tremendously popular in various fields like business, social, media, health, scientific, and even military. On one hand, enterprises can take the benefit of Android applications to support their business needs. On the other hand, Android devices contain rich sensitive data—e.g., GPS location, photos, calendar, contacts, email, and files—which is critical to the enterprise and unauthorized access to this sensitive data can lead to serious security risks. In this paper, we describe the nature and sources of sensitive data, what malicious applications can do to the data, and possible enterprise solutions to secure the data and mitigate the security risks. The purpose of this paper is to raise employees’ and enterprises’ awareness against such security threats and risk.
Keywords: Android, Security Risk.