Types of Android Attacks
Attackers lure users to download applications from untrusted sources. These APK’s may contain malicious software inside them, giving the attacker remote access to the mobile device when the APK is installed by the user.
The user may come across a suspicious SMS giving them big bounty’s. When the users click that particular link in the message, they may be redirected to a malicious website giving away their sensitive information or may lead to financial loss.
Phishing emails may redirect the users to malicious websites compromising the user’s details. SPAM emails may steal information from the users.
Some applications may spy on the mobile users and report to the remote attackers.
App sandboxing issues:
Sandboxing is the process of testing an App in a limited resource environment against various threats and attacks. If sandboxing has issues, it means that malicious applications can bypass this mechanism.
Rooting is done for increasing speed and performance of an android device. This is not a recommended solution by the android authorities. When a phone is rooted, it loses its warranty and may open the door for various malware and allows the attacker to take control of the device remotely.
Do not root your phone.
Do not download applications from untrusted third party sources.
Do not click on suspicious emails.
Do not open suspicious SMS.
Use strong passwords/patterns.
Use Device administration API to set up password policy, remote wipe, etc.
Do not store passwords on phone.
Update the operating system regularly.
Use strong anti-virus.