Next Generation Communications Blog

Android tag

Drill down on Android search:

2 result(s) displayed for Android (1 - 2 of 2):

Android Malware Can and Should be Stopped at the Network Level

By: Mae Kowalke, TMCnet, Contributor

I just bought an Android tablet after living exclusively in the Apple iOS world for the past couple years. The cost of the cheaper Android tablet was great, and my geek side surely will enjoy the customization options in the days ahead. However, what I do not look forward to are potential security issues.

All of the reports in recent years have exposed the fact that the Android environment is more susceptible to being compromised than IoS, however, recently even that is becoming a matter of degree as cracks in the Apple armor have been exposed. The one as somebody who is in the tech industry and tries to be vigilant that should make us Android users be somewhat concerned is the Stagefright vulnerability which hopefully will not make it into the wild.

To be frank, Stagefright is pretty scary. Anyone with an Android mobile device who is vulnerable to the exploit should be thinking about it, and that’s roughly close to 1 billion devices at last count. What makes Stagefright so frightening is that it isn’t just a malware exploit that cause significant grief.  In what might be considered a perverse flip side of ease-of-use, Stagefright is unfortunately about ease-of-infection.  It loads itself onto an Android device with nothing more than an MMS message. A message with a carefully crafted media attachment can infect the Android device without any user intervention.

Analyzing the mobile devices connected to today's network

By: Patrick McCabe, Senior Marketing Manager, Alcatel-Lucent

We know from our own experience and from anecdotal evidence that mobile devices are proliferating and that mobile data usage is growing rapidly. This tremendous change necessitates change to the underlying network, too. But in order to make the best choices in terms of infrastructure investment, mobile service providers must have accurate data showing what devices are being used and which consume the most data and signaling resources. 

Featured Events