{"id":15032,"date":"2014-11-26T19:11:13","date_gmt":"2014-11-26T19:11:13","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2908"},"modified":"2020-02-26T10:57:57","modified_gmt":"2020-02-26T15:57:57","slug":"security-features-in-android-5-0","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/security-features-in-android-5-0\/15032\/","title":{"rendered":"Security features in Android 5.0"},"content":{"rendered":"<p>We took a look at Android 5.0 Lollipop\u2019s security, specifically its corporate-oriented security features; it offers quite a few.<\/p>\n<p style=\"text-align: center\">\n<\/p><p><strong>Android security: the issues<\/strong><\/p>\n<p>Android has a reputation for having the most malware-targeted mobile OS. In part, this is due to its popularity as a \u201ccheaper alternative\u201d to the iOS-based devices, and partially because of the past errors in code and the persistence of the legacy devices in use. Existence of third-party app stores with under-controlled content is a major factor as well.<\/p>\n<p>While Google engineers argue that the security issues with Android are exaggerated, the latest joint report released in October by Kaspersky Lab and INTERPOL <a href=\"https:\/\/business.kaspersky.com\/the-ups-and-downs-of-mobile-threats\/2760\" target=\"_blank\" rel=\"noopener nofollow\">shows<\/a> that slightly above 98% of mobile malware targets Android-based devices worldwide, and as the user base grows, so do the threats.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Security features in #Android 5.0: candies and serious stuff<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FLf5V&amp;text=%23Security+features+in+%23Android+5.0%3A+candies+and+serious+stuff+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Still, it would be unfair to say Google does nothing about it. It actually does a lot. Android 4.2 Jelly Bean, released in 2012, came with a lot of enhanced security features. Among them: a built-in malware scanner which works in combination with Google Play, but is also capable of scanning apps installed from third party sources, and an alert system which notifies the user when an app tries to send a premium-rate text message, blocking the message unless the user explicitly authorizes it.<\/p>\n<p>What comes with Lollipop?<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020213\/wide2-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2910\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020213\/wide2-1.png\" alt=\"wide\" width=\"1000\" height=\"594\"><\/a><\/p>\n<p><strong>Security candies<\/strong><\/p>\n<p>New security features in Android 5.0 include:<\/p>\n<p><strong>1. SELinux enforcing mode for all applications on all devices<\/strong><\/p>\n<p>SELinux stands for Security Enhanced Linux \u2013 Android has been built on this since last year. According to <a href=\"http:\/\/officialandroid.blogspot.ru\/2014\/10\/a-sweet-lollipop-with-kevlar-wrapping.html\" target=\"_blank\" rel=\"noopener nofollow\">Google\u2019s official Android blog<\/a>, SELinux \u201cpushes enforcement of the Android security model further into the core of the OS and makes it easier to audit and monitor so there\u2019s less room for an attack\u201d. Simply put: The security checks are made at the kernel level. Not exactly a \u201ccorporate-oriented\u201d feature, but an extremely important one.<\/p>\n<p><strong>2. Full device encryption from the start<\/strong><\/p>\n<p>Previously disabled by default, it would require a user to dig up the device setting to find it, then wait while all the device data is being encrypted \u2013 a time-consuming task.<\/p>\n<p>This time, Android offers to turn on encryption at the first boot-up of a new device running Lollipop, and since the device is supposed to be mostly clean of data, it will run fast and smooth. New data will be encrypted as it arrives. This feature is of utmost importance for corporate security, as well as for the safety of the users\u2019 personal data.<\/p>\n<p><strong>3. Smart Lock, smart and aware<\/strong><\/p>\n<p>While malware threats are displeasing, the possibility of losing the device or getting it stolen is a much more immediate threat. What Google offers to mitigate this is strange, but interesting. The Smart Lock feature, according to Google, \u201clets you tell your phone to unlock using Bluetooth pairing, NFC, or simply your smile \u2014 faster than before\u201d.<\/p>\n<p>That essentially means the device will unlock itself once it discovers a certain \u201cbeacon of safety\u201d \u2013 a certain Bluetooth device or an NFC tag that marks a safe environment.<\/p>\n<p>How safe is this particular approach? Connectivity-for-security is a good trend, well aligned with the \u201cInternet of Things\u201d paradigm, although there is reasonable concern of possible vulnerabilities in certain devices and connectivity protocol implementation issues.<\/p>\n<p>Interestingly, according to <a href=\"http:\/\/www.computerworld.com\/article\/2839452\/android-50-security.html\" target=\"_blank\" rel=\"noopener nofollow\">Computerworld<\/a>, Google plans to move forward with this approach, adding features to the current Smart Lock functionality via Google Play (so you won\u2019t have to wait for the next major release to acquire them).<\/p>\n<p>And what about \u201cwith your smile\u201d? Its Trusted Face feature unlocks the device by facial recognition. This was actually introduced with Android 4.0, but was barely usable. Now it looks more practical.<\/p>\n<p><strong>4. Lend a device, not data<\/strong><\/p>\n<p>Android 5.0 offers a set of functions for shared devices \u2013 i.e. for smartphones that more than one person uses.<\/p>\n<p>First, there is a Guest User mode available for both phones and tablets: A guest may use their basic functions, but will not have access to the owner\u2019s personal data.<\/p>\n<p>The other feature is more interesting. If you forget your phone, you still can call anyone or access your messages or photos by logging into another Lollypop device. That essentially means data is stored in the cloud and accessible from any Lollypop device. This approach is similar to what Google offers with the Chrome browser: Install a fresh new browser on a new PC, and once you\u2019ve logged into your Google Account, all of your bookmarks and settings are imported automatically.<\/p>\n<p>Google recently tightened the security noose further with Chrome and Google Accounts, preventing \u2013 by default \u2013 access attempts from \u201cinsecure\u201d apps and devices. For instance, just a few days ago this blogpost author\u2019s attempt to login into Google Talk from an iPad failed, and a security alert was raised in Chrome. However, after installing Google Hangouts the problem went away on its own, without changing these new-default settings.<\/p>\n<p><strong>5. Reaching out<\/strong><\/p>\n<p>With device loss a major security concern, mobile OS simply must have functions for remote control over the device. Android offers a full range of them. Since 2013 it\u2019s equipped with Android Device Manager, which allows you to find the lost device, locate it on a map, or, if it absolutely cannot be recovered promptly, wipe out all of the data, preventing it from getting into the wrong hands.<\/p>\n<p>This is a feature especially important for businesses. Too often sensitive data is stored on mobile devices, which are easily misplaced. Having those devices compromised could lead to long lasting and devastating repercussions.<\/p>\n<p>There is also a Factory Reset Protection feature, a somewhat euphemistic name for remote bricking the device. Without knowing the password, the stolen smartphone or tablet will be unusable and, more importantly, unable to be wiped. This is supposed to be discouraging to thieves since they won\u2019t be able to access the data or sell it as a new device.<\/p>\n<p><strong>6. Android for Work<\/strong><\/p>\n<p>A number of system-level, enterprise-oriented features have been added to Lollipop. Samsung, which is a hardware mainstay for Android, contributed its Knox security framework for segregating personal and work-oriented data from each other on a device, along with a few accompanying APIs for managing the environment. IT personnel will be able to deploy apps in bulk to business-user devices and maintain centralized control over sensitive functions, which is a necessity for keeping BYOD in good health, diminishing the headache it causes to admins.<\/p>\n<p><strong>7. The right stuff<\/strong><\/p>\n<p>Google does a great job with improving security. This, however, doesn\u2019t mean that all security issues with Android will be sorted out with 5.0.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Lollipop is good with security, but how fast is it going to be adopted?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FLf5V&amp;text=%23Lollipop+is+good+with+security%2C+but+how+fast+is+it+going+to+be+adopted%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>First, adoption rates of new versions of Android are notoriously slow. The most popular version today is last year\u2019s Kitkat (4.4) with 30.2% distribution share, but Jelly Bean 4.1.x and 4.2.x, released in July and November 2012, hold 22.8% and 20.8%, respectively (summing to over 40% together). And yet older and weaker 2.3.x Gingerbread versions still hold slightly below 10%.<\/p>\n<p>All of the older versions had a lot of room for improving security \u2013 just a week ago a new critical bug was discovered, affecting all Android versions below 5.0. Eventually we will most likely see some critical bugs in Lollipop too, as no software is flawless.<\/p>\n<p>But the \u201cpersistence\u201d of the older versions is clearly a human factor, as is the <a href=\"https:\/\/business.kaspersky.com\/vulnerable-android-and-the-negligence-of-users\/1091\" target=\"_blank\" rel=\"noopener nofollow\">negligence<\/a> of users who ignore security and encryption tools in their devices.<\/p>\n<p>A human factor is actually the primary security concern everywhere, but the durability and security of a software platform is important, too. Microsoft keeps doing their job by improving the security of Windows, which has always been the most targeted PC operating system. Google is following the same path now with Android, although at a much higher velocity. It is extremely encouraging to see Android\u2019s security being improved quickly, and we can only hope that Google keeps up the good work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Android 5.0 is here, but what kind of security does it offer? <\/p>\n","protected":false},"author":209,"featured_media":15847,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[105,851,218],"class_list":{"0":"post-15032","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-android","10":"tag-lollipop","11":"tag-mobile-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-features-in-android-5-0\/15032\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-features-in-android-5-0\/15032\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-features-in-android-5-0\/15032\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15032"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15032\/revisions"}],"predecessor-version":[{"id":33397,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15032\/revisions\/33397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15847"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}