Blog

Get the inside scoop at Cyphercor and learn about relevant security news and insights.

Chinese Company Installs Backdoor on Android Devices

August 29, 2018Patrick Duffin and Jolene Dilny

Kryptowire, a security firm, has uncovered a firmware backdoor that has been installed on BLU R1 HD android devices. The Chinese company had reportedly made a mistake by installing the software, but was inadvertently collecting user’s personal information. This information included phone numbers, texts and location services to the Android devices. These smartphones could be purchased from big retailers including Best Buy and Amazon. This information was collected without user consent or knowledge on their devices.

Mobile security is becoming an increasing concern as more organizations introduce mobile computing to their workforce, and more employees are utilizing the Bring Your Own Device (BYOD) model, instead of using a dedicated company smart device. This makes the importance of securing mobile technology more relevant than ever before.

Users should be aware and stay up to date on mobile security and press releases that outline targeted breaches and malware that can affect a user’s device. It is also important to note that security breaches such as this one means SMS is not a secure two-factor authentication method, as identified by the National Institute of Standards and Technology (NIST). This leaves users vulnerable to attacks from smartphone manufacturers, malware, and other security flaws.

LoginTC utilizes a mobile smartphone application that is much safer than SMS, and leaves less smartphones vulnerable to attack. By leveraging an open source system, users must authenticate through the approved application, and companies can also require a four-digit passcode for added security.

Actively reviewing smartphone security, and ensuring that the systems employees are using on their devices are secure is one of the most effective ways to safeguard against attack and security breaches. To learn more about LoginTC, and how two-factor authentication can be used to add another layer of security, visit https://www.logintc.com/solutions.

Start protecting your enterprise assets within minutes. Get Started