Android has brought a
variety of phones, with different hardware and software features to the market.
This has enabled more people to get the phone that they want. Bit9 says
that unfortunately this has led to “an estimated 56% of Android phones
in the marketplace today are running out-of-date and insecure versions of the
Android.”
It seems that when
phones are released they can be running versions of Android that can be up to
18 months out of date, and thus lacking all the latest security updates.
"All operating
systems have vulnerabilities," Harry Svedlove, Bit9's chief technology
officer, points out, but it's how quickly and effectively software gets fixed
that matters. Bit9's analysis of the most vulnerable smartphones is based on
criteria that includes looking at smartphones with the highest market share
that were running out-of-date and insecure software and had the slowest update
cycles.
The Bit9 "Dirty Dozen" not-so-smart smartphone list
includes:
1. Samsung Galaxy Mini
2. 2 HTC Desire
3. Sony Ericsson Xperia X10
5. HTC Wildfire
6. Samsung Epic 4G
7. LG Optimus S
8. Samsung Galaxy S
9. Motorola Droid X
10. LG Optimus One
11. Motorola Droid 2
12. HTC Evo 4G
Most of the problem
seems to stem from how mobile devices are updated. Think about the process for
a second: Google put out an update, it goes to the hardware manufactures to
include in their modified version of Android, and then it gets sent to the cellular
carriers to release over their network.
Bit9
points out that having to rely on the phone manufacturer and wireless service
provider for software updates is "akin to buying a PC from Dell and
relying on Dell to coordinate with your home Internet provider, instead of Microsoft, to update your Windows software."
Android
manufacturers such as Samsung, HTC and Motorola have made software updates
available on their websites to end users that want to go looking for them over
the Internet. But he says this remains an extremely clunky procedure with its
instructions for docking, utilities and downloading, giving it a complexity
that only geekiest of geeks could figure out.
What is even scarier
is that “In comparison to the chaotic
universe of Android smartphones, in which manufacturing cycles are flying in
every direction at 12 to 18 month intervals, Svedlove notes, the old Microsoft
Windows PC environment seems like an orderly world that's predictable, with
software updates controlled over the Internet.”
Who would have ever
believed that the words Windows,
orderly, and predictable would be used in the same sentence?
This should not be
taken to mean that Apple products are without their own concerns. Back in June 2010,
Goatse Security uncovered a vulnerability within the
AT&T website that enabled them to steal 114,000 email addresses of AT&T
Apple iPad users customers. This is in addition to the attempted attack on AT&T
online accounts.
Source:
- The Dirty Dozen of security-vulnerable smartphones, y Ellen Messmer, Network World on November 21, 201
- Goatse AT&T attack: Goatse Security From Wikipedia, the free encyclopedia and Newser AT&T, iPad Hacker Pleads Guilty