A walk through the Android Software Development Kit and libraries will show you some interesting scenery. You can, for example, see how a few strokes of code will allow you to write an application that can access an Android device’s contact list and phone, in the background.
And it might show you how to write an app that will launch the device’s email service and even send emails.
The Android SDK hiking tour will also provide a distance marker with instructions on how to put together an app that will launch a device’s text-messaging feature to both receive and send data.
If you’re an upstanding citizen and software developer, you can use that information to create powerful, secure, productive and “gee whiz” apps of the kind that have made Android one of the fastest-growing operating systems of all time. If you’re a hacker or a criminal, however, you can use Android to launch vicious, destructive attacks on individuals and, potentially, infrastructure.
Last month more than 50 Android apps were found to contain malware called DroidDream, ranging from gaming apps to a currency converter app to a scientific calculator app, according to security software maker Lookout.
Lookout reported that the Trojan known as DroidDream used two exploits called “exploid” and “rageagainstthecage” to infect Android-based devices.
Lookout said it found that hackers had used exploid to deploy itself looking like a legitimate “calling plan management” app and began hitting the market via what it said were Chinese app markets.
Eventually, Lookout said, a version of that app turned up in the official (and more mainstream) Android Market. A further review found this app turned out to be, essentially, a dud because it didn’t have the code to fully exploit a device.
Copyright © CRN Australia. All rights reserved.
Issue: 337 | April 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.