Wednesday, December 21, 2016

Sending data from Android to China is higher than expected – Follow

One of the most recent flaws discovered in Android has shown its vulnerability in the face of the software used by a third party. The discovery showed that the company Adups was to collect data from users, without which this collection was authorized.

But a new analysis of this problem showed that he is much greater than expected, and that, after all, is the reaching of relief that they believed to be immune.

Android Adups


When the company Kryptowire discovered this behavior of the software from Adups, its impact was confined to a few brands, and most of China. Only the BLU was identified as being the problem, resolving it quickly.

But a new analysis of the security company Trustlook came to reveal that after all there are many more brands use this software Android update and in that list are names that are much larger, such as Lenovo, ZTE, or the Archos. Altogether, there are now 43 brands of phones that are identified with the software of the Adups.

the problem is in The data collection that the Adups makes and sends to their servers, without the consent or knowledge of users. In addition to smaller data, such as the IMEI, the operator name or the Mac Address, this software collects still messages and history of calls of the users.

Android Adups

Interestingly, some of the brands that have now been identified with the software of the Adups were denied its use at the time that the problem has been reported.

When the Adups was faced with this problem, recognized it immediately and ensured that its use was improper. This should not be placed on these smartphones because its existence is part of a project that had to do with a chinese manufacturer, who had asked to be able to control the behavior of its users remotely.

When using the systems update that are not those of Google, the manufacturers and their users are exposed to, allowing your data to be collected without giving for it. It is also the patent of the vulnerabilities of Android, which base allows these changes.

LikeTweet

No comments:

Post a Comment