{"id":7834,"date":"2017-02-07T12:00:15","date_gmt":"2017-02-07T17:00:15","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=7834"},"modified":"2017-02-07T06:51:02","modified_gmt":"2017-02-07T11:51:02","slug":"can-android-become-secure-2017","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/can-android-become-secure-2017\/","title":{"rendered":"How Can Android Become More Secure in 2017?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Android was listed as the most vulnerable operating system of 2016, behind Linux and Flash Player, based on data from Common Vulnerabilities and Exposures (CVE). This is far from good news, but there are many reasons Android is considered to be less secure than other operating systems. Some of those reasons include how widely adopted Android is, how widely used Android is globally, and that there\u2019s more freedom with its operating system than others. That\u2019s why it\u2019s important to run regular virus scans on your Android. Click here to scan your Android for malware now:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-7530\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7530\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/Security-Scan.png\" alt=\"Security Scan\" width=\"300\" height=\"78\" \/><\/a><\/center><b>What Makes Android Vulnerable?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Three factors play a role in determining the vulnerability of an operating system. <\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Flaws within the software<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Potential for attackers to access the flaw<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Possibility for attackers to exploit the flaw through tools\/techniques <\/span><\/li>\n<\/ol>\n<p><b>The CVSS Score<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The total number of security risks in the quantitative sense isn\u2019t the most important piece of information for determining vulnerabilities. The CVSS score defines what vulnerabilities are more dangerous than others. Therefore, if a developer is utilizing a program for finding and repairing security holes, the ratings may be lower than developers who do not utilize these programs. Minor security weaknesses do not add up to as large of a threat as one critical weakness.<\/span><\/p>\n<p><b>System Vulnerabilities<\/b><\/p>\n<p><span style=\"font-weight: 400;\">All vulnerabilities, whether present on mobile devices, operating systems, desktops, or etc., put users at risk for having their private information compromised. Security weaknesses are a pathway to viruses and other malware, which is used to steal personal information from users. This information can be leaked or used by unauthorized people, causing privacy to be lost, as well as time and money. Since Androids are used by such a large portion of the population, it only makes sense that hackers would target the system\u2019s strength. <\/span><\/p>\n<p><b>How Can Android Improve For 2017?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Google develops software updates for Android users, but that may not be enough to keep third party apps and features free of viruses. One possible solution is a more closely monitored standard for all apps available on the Google Play store, making it more difficult for third party developers to create malicious apps. In the meantime, enable advanced protection for additional security:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/advancedProtection\" rel=\"attachment wp-att-7462\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7462\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/Advanced-Protection-02.jpg\" alt=\"Advanced Protection 02\" width=\"300\" height=\"78\" \/><\/a><\/center><span style=\"font-weight: 400;\">Android users can take further action to protect themselves from viruses and attacks caused by the potential vulnerability of their devices, such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Change your passwords often and never re-use the same password across several accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Only connect to secure, private Wi-Fi networks.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Download credible apps only.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Android was the least secure operating system of 2016, according to Common Vulnerabilities and Exposures (CVE). Learn more now.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[4299,4296],"class_list":["post-7834","post","type-post","status-publish","format-standard","hentry","category-security","tag-system-vulnerabilities","tag-the-cvss-score"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=7834"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7834\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=7834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=7834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=7834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}