Home » Alerts » Android Gadgets – One More Reason Why Your Enterprise Requires End Point Security

As much as Android is appreciated all over the world, it has its own drawbacks. Yes, it is an open source platform, it gives away hundreds of amazing applications for free, and it is open for modification. So, where’s the drawback? Most people must have seen that Android gadgets are not so keen in getting frequent updates or safety patch.

Recent reports extracted from developer.android.com stated:

Less than 5% of Android devices are running Nougat, the current version of the Android OS (comparatively more safe Android OS).

Marshmallow is active on about 30% of the gadgets.

A surprising 45% of Android phones are still putting up with grandpa Lollypop that is by the way, has a poor safety score against malware.

So, what do all these facts justify?


Let’s take a reality check first –

  1. A) Users of Android easily exceed the number of users of other mobile operating systems. This shows, Android mobiles are just everywhere.
  2. B) Most organizations have started taking up the Bring Your Own Device method. In other words, they now permit their staff to use their personal mobile gadgets for official task like accessing the company’s network.
  3. C) The growth rate of Android malware can give famous Athlete Usain Bolt a run for his money.
  4. D) Third party Android stores play host to thousands of Android apps.
  5. E) Even Google play is not carefully policed for infected apps.

Now, merge the points A, B, C, D and E mentioned above! You have with you a work of art defined “There Goes My Business.”

SMEs, Enterprises, and large ones alike, with a delicate watchtower on the types of mobile devices looking their network and data, could be the weakest prey in the group for nasty hackers. But, running a huge number of such devices and inspecting each one of them could put a huge burden on the top level management’s head.

So, how can you secure your company’s network and allow staff uses their mobile phones at the similar time?

Does end point security ring any bells? Having your enterprise protected by an end point security method can considerably decrease a malware threat that can take place via compromised mobile gadgets (Android ones in this case). In addition to that, there are other advantages too:

  • Web security that protects your device from infected websites.
  • Web filtering that stops unproductive and improper websites.
  • Email safety that filters every email as it reaches the enterprise network.
  • On-demand and proper virus scan of all endpoints from a central location.
  • Dashboard that gives real-time messages in case a serious security incident takes place.

Eset End Point Safety makes sure that your enterprise runs effortlessly with all such advantages and be in compliance with standard safety policies. Eset Technical Support helps in case of any emergency related to the configuration of Antivirus. The technicians are always available to fix the issues of Antivirus.

It appears that, a new virus application is on the loose that poses as antivirus software for Android gadgets.

Eset has diagnosed this Android virus as Android.Agent.BU. Before installation, the application asks the user for administrator rights. It pop-ups two options – ‘Cancel’ and ‘Activate’. And this is where the malware lies. Even if the user selects the ‘Cancel’ button, the application gets installed and takes the administrator straight anyway.

After the forge antivirus gets installed, it gives the user with several options for scanning the mobile device.

Selecting any of these options will start the application to process malicious activities in the background. And this will look like a simple virus scan to the user.

The virus is designed to do the following tasks in the background:

  1. Stealing the following data from the compromised phone and sending it to the hacker:
  • Call-list
  • Phone number
  • Date of call
  • Call type
  • Call duration
  • Bot_id
  • IMEI (International Mobile Station Equipment Identity) number
  1. Accessing text messages from the Android device’s Inbox.
  2. Deleting user information from the compromised phone and even SD card data.
  3. Sending and calling SMSs to premium numbers, without the user’s knowledge.