Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. For example, last summer, unlucky SMS recipients were invited to download Trojan-SMS.AndroidOS.FakePlayer, a free Movie Player. Here's everything you need to know about managing Android devices. But it has also prompted swift action from the company. Android security enables privacy. Keep up with security news; Follow eSecurityPlanet on Twitter: @eSecurityP. Tap to get driving directions or talk to send a text. Users may also want to enroll in a remote lock service (often combined with find) but beware of SMS dependencies. However, Android does provide APIs that MDM agent apps can use to read/write settings (e.g., password complexity), query attributes (e.g., installed apps, GPS location), and invoke remote lock or wipe. Connect your phone to your car display—your Android apps show up onscreen, just like that. In Juniper’s survey, 3 out of 4 users locked their smartphones. According to Motor1, Toyota won’t integrate its cars with Android Auto because of privacy concerns. First, those remote lock apps and APIs can request remote wipe as well, resetting the device to factory defaults – but only when reachable, without wiping SD card data. The key elements to look for are cross-platform support -- especially across multiple Android releases -- and integration with other operational management systems. TechnologyAdvice does not include all companies or all types of products available in the marketplace. Android 9 answers: 20 fast fixes for common Pie problems Solve all your Android 9 irritations with these easy-to-follow fixes for common Pie problems. Toyota won’t implement Android Auto anytime soon due to privacy concerns. In addition to the usual security-related changes, the patch also includes a few fixes for Android Auto. Many, however, remain skeptical of open source in general and of Android in particular, thanks to past problems with app security. Here, we consider today’s biggest Android security risks and what can be done to mitigate them. The Android community has made huge progress in improving security. But repackaging is also used to implant Android trojans, such as the Android.Pjapps trojan (included in modified versions of the Steamy Windows app) and the Android.Geinimi trojan (turns infected phones into bots). Here, we consider today’s biggest Android security risks and what can be done to mitigate them. 3. Naked data: A major business risk posed by Android is lack of hardware data encryption. When this happens, the application still normally works, it doesn't freeze or anything, … Unfortunately, Android users cannot quickly patch around bugs, because OS updates are deployed infrequently by carriers. And have fun along the way. It is unclear whether 09Droid intended to phish for banking passwords, but when banks complained, those fraudulent apps were pulled from the Market. Even though mobile operating systems such as Android are superior to PCs when it comes to protecting against security threats, there still are several concerns that IT should beware. For more rigorous protection, enterprises should scramble sensitive data such as email and contacts using self-encrypted apps (e.g., Good for Enterprise, Exchange Touchdown). Considerations for SASE management and troubleshooting, SASE challenges include network security roles, product choice, Big Tech's uneasy balance of capitalism, censorship, Microsoft slow to fulfill request for more Teams channel control, Ensure phone system compliance with 911 regulations, Tenable: Vulnerability disclosures skyrocketed over last 5 years, Select a customer IAM architecture to boost business, security. Does IT? Fortunately, Android 3.0 (“Honeycomb”) adds an API to let manufacturers offer encryption and IT enforce use. SMARTPHONE. The open source nature of Android should provide some comfort that the architecture and security mechanisms of a given implementation are appropriate, effective and uncompromised. Last fall, M.J. Keith showed that a known WebKit browser vulnerability could be exploited on Android 2.0 or 2.1. Those security concerns have been widely reported, slowing Zoom's growth. Enterprise mobility management (EMM) suites can help improve Android device security with their content, application and identity management features. Many repackaged apps found on third-party Android markets are legitimate free apps, repackaged to generate ad revenue. 2. Here are the ... New research from Tenable shows a dramatic increase in vulnerability disclosures since 2015, as well as concerning data about ... Not all customer IAM platforms are created equal. Don’t frequent unregulated third-party markets or manually install Android packages from untrusted sources. A 29-year industry veteran, Lisa enjoys helping companies large and small to assess, mitigate, and prevent Internet security threats through sound policies, effective technologies, best practices, and user education. Some users have been reporting that Android Auto doesn’t work smoothly since they’ve updated to Android 11, but a new update looks to fix some of those issues. The Outlook for iOS and Android app is designed to enable users in your organization to do more from their mobile devices, by bringing together email, calendar, contacts, and other files. A bit of this can also be done via Exchange ActiveSync. Flimsy passwords: If your Android falls into the wrong hands, more is needed to prevent thieves from stealing broadband service, ringing up SMS fees, reading your email, or abusing VPN connections. Lisa has been involved in the design, implementation and evaluation of networking, security and management products for 30 years. The biggest problem area regarding user behavior has to do with apps. Unlike iOS, Android does not yet offer native MDM to enable third-party device management. News Break App. That's why so many vendors have entered this lucrative $100 billion+ market. I'm having issues with my Android Auto. DJI has fired back, saying the app does not have any of these issues. One of the most effective solutions to the problem of viruses, worms and other malware is the use of mobile application management, which can prevent an infected app from contaminating an entire device. Android Auto only works with certain devices, vehicles and USB cables. Still, Android users -- this reporter included -- have reason to be concerned and to remain wary," Goodin wrote. Click to Expand. Remote work is here to stay, so it's time to rethink the short-term fixes made in 2020. There are three fundamental ways to save data on the device: The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties... October is National Cybersecurity Awareness Month, and as people are the weakest link in the cybersecurity chain,... Top Endpoint Detection and Response (EDR) Solutions, Adobe Fixes Zero-Day Reader, Acrobat and Flash Flaws, Apple White Hat Hack Shows Value of Pen Testers, Employees and Data Backup Top Cybersecurity Awareness Month Concerns. Check your phone. Lisa Phifer owns Core Competence, a consulting firm focused on business use of emerging network and security technologies. Lack of visibility and control: Ultimately, enterprises must embrace Androids – even employee-purchased Androids – so that IT can regain visibility into and control over business activities on these devices. We’ll deliver alerts to you using both email and the Google Play Console, with links to a support page with details about how to improve the app. And yet, Pixel 5 issues on Android Auto have been around for several months already, and one of the most common causes head units in the car to fail to recognize the device. Start my free, unlimited access. Unfortunately, existing Androids cannot yet perform hardware encryption. 18. Cookie Preferences The solution to the Android fragmentation problem is to limit the number of devices and operating system versions allowed, whether they are corporate-issued or BYOD. SASE opens new territory for network and security management and troubleshooting. 10. Google has published the latest Android security bulletin and started to roll out the over-the-air (OTA) February security update to users of Pixel handsets. Read More . This is an excellent first line of defense, but users need to understand Android’s limitations. If you don't already, using lock screen security is a must. Configurable settings are limited but rapidly expanding – more so for some manufacturers than others. Second, enroll your Android with one of the many available “find me” services to locate and recover lost devices. Check with banks or other institutions to confirm apps are distributed by an authorized developer and beware of look-alikes. Once installed, FakePlayer started texting premium-rate numbers, without user knowledge, ringing up huge bills. Pull down the notification shade and tap the gear icon. Summary: This article covers the most common questions asked by customers and administrators about using Outlook for iOS and Android with Exchange Online and Microsoft 365 or Office 365.. If you're running version 6.0 of Android or earlier you're vulnerable to malware, says consumer watchdog. So, not long after allegations that the Android version of DJI’s popular GO 4 app might have some security issues, there’s a new claim that the DJI Pilot app – meant for professional Enterprise users – may share similar problems. Android apps must request permissions during installation – users need to seriously review those requests, exercise caution, and avoid apps that seem too nosy. Repackaged and fraudulent apps: Some apps aren’t what they appear to be. For example, Sybase Afaria now provides over-the-air app management for Android. Acceptable use and security policies need to be in place before deploying any management products, however, and these policies must align with overall organizational objectives. ... Scroll over to Security and you may see a Security issues found section; tap Secure account here. Typica… 6. We protect your data from prying eyes by wrapping it in encryption and setting boundaries around what apps can and can’t do in the background. Learn the fundamentals of Android application security. Those capabilities are becoming more important so as to avoid overlapping or conflicting features, as well as to maximize IT productivity. Last year, “09Droid” sold about 40 different mobile banking apps at the Android Market. But we should all remember there is no such thing as absolute security. In this article. It's an essential security check for Android. That is apparently what DroidDream did last month. And when you want to browse? The most common security concern for an application on Android is whether the data that you save on the device is accessible to other apps. Recently, Google fixed an Android Market cross-site scripting (XSS) vulnerability that enables arbitrary code execution, found by John Oberheide. 8 Android Security Concerns That Should Scare IT. But IT managers would be well-served to pay careful attention to the potential pitfalls that remain. Android malware: According to traffic analysis by AdaptiveMobile, Android malware spike 400 percent last year. Just plug in and go. ... Sign in. Check compatibility Cybersecurity is the hottest area of IT spending. That's right. One of IT’s biggest challenges: Android’s consumer roots mean minimal support for enterprise-class security. The good news is that Android device management supports these technologies, whereas iOS does not. According to the App Genome Project, Android Market apps more than doubled in the past 6 months. AWOL Androids: The top concern about any mobile device is loss. SMShing: This phishing variant uses texting to trick smartphone users into visiting fraudulent or malicious links. Essential Enterprise Mobile Security Controls, Mobile security moving to a unified approach, SearchSecurity Survey Reveals Top 5 Enterprise Mobile Security Issues, Why IT Must Break Down Silos as Part of its Digital Transformation Initiative, Preserve Your Choices When You Deploy Digital Workspaces. A whopping 28 percent of those apps now access device location, while 7.5 percent access stored contacts. Even call your mom, hands-free. Most of these can be avoided by installing apps only from the Google Android Market. Hackers are now being drawn to Android’s popularity and openness. Cybersecurity researchers on Thursday revealed security issues in the Android app developed by Chinese drone-maker Da Jiang Innovations (DJI) that comes with an auto-update mechanism that bypasses Google Play Store and could be used to install malicious applications and transmit sensitive personal information to DJI's servers. First, install an auto-backup app (e.g., WaveSecure, MyBackup) to enable quick restoration of all that matters to you. Last year, Android became the world’s second favorite mobile OS, racing past BlackBerry and Apple. I'm using it with OnePlus 7T Pro (with the latest OOS 10.0.13 and the latest AA 5.9.604634). But even apps distributed by the Google Android Market receive no official review. Nosy apps: Speaking of the Android Market, telling friend from foe can be hard. 8. Policies should require the use of device passcodes, appropriate backup and storage and adherence to best practices for avoiding social engineering attacks. And don't hesitate to blacklist third-party apps that raise security concerns. Before any app is accepted into Google Play, we scan it for safety and security, including potential security issues. Unsafe surfing: Think web browsing on your Android is safe? As an open source OS, Android has a wide range of modified versions implemented on a significant number of devices. Privacy Policy 1 of 11 (Image: Andre Kheren via Pixabay) Compared to traditional PC operating systems, the Android smartphone OS is far and away more secure. Check out sellers and read reviews. Enterprises may also consider using a Mobile Device Manager (MDM) that can monitor Android wireless expenses (e.g., SMS, roaming). Thomas Cannon reported an Android 2.2 browser flaw that could give hackers full SD card access. Android Auto is made to help you focus on the road. When Coverity assessed the Android kernel, it identified 359 code vulnerabilities, 88 of which posed “high risk” of exploitation. Because Android is an open development platform, hackers have ample opportunity to find and learn how to take advantage of these kinds of flaws. To check permissions, jump into Android’s settings menu. Lisa Phifer is president of Core Competence, a consulting firm focused on enterprise adoption of emerging network and security technologies. But putting a management framework in place can help you leverage new Android security capabilities as they emerge. Official Android Auto Help Center where you can find tips and tutorials on using Android Auto and other answers to frequently asked questions. Apple iPhone users can restore nearly everything from iTunes, but Androids are not managed via desktop sync. Ultimately, teams should look for system ... Cisco has agreed to pay $4.5 billion for Acacia, $2 billion more than the initial agreement in 2019. Perhaps the single biggest criticism of Android has to do with the diversity of its ecosystem. 1. Copyright 2003 - 2021, TechTarget In a BYOD world, users expect to do whatever they want with what are, after all, their own devices. Android was designed with security as one of its cornerstone principles. Hidden inside about 50 Android Market apps, including Sexy Girls, Advanced File Manager, Task Killer Pro, and Advanced Sound Manager, DroidDream “rooted” infected phones, sending IMEI/IMSI and OS version back to a command-and-control server. Here are five Android device security challenges to focus on in the coming year: Fragmentation. One work-around: Using an app like BadLink Check or TrendMicro to avoid known-malicious websites. From there, scroll down to “Apps.”. Instead, Androids should be locked with PINs or passwords (2.2 or later) or third-party lock apps such as Norton Mobile or AppProtector. As a result, approximately half of enterprises are working to embrace Android devices. 67 million of the nearly 300 million smartphones sold in 2010 were Android-powered devices like the Samsung Galaxy S, Motorola Droid X, and HTC EVO. Enterprises should go further by testing apps in a lab environment, then using an MDM to suggest or auto-install verified safe apps on employee Androids. This state of affairs can create a nightmare for support and security staff. Will a security-focused or marketing-focused CIAM architecture best meet your ... All Rights Reserved, AWOL Androids: The top concern about any mobile device is loss. To use Android Auto your phone must be running Android 5.0 or higher. Mobile content and application management are clearly more critical than ever to control the flow of data among apps. Be very careful when downloading apps that access sensitive accounts. We included many different examples for the sake of diversity; shop around to find Android security suite(s) that best fit your own needs. Sign-up now. The update has apparently caused issues with Android Auto, leading to some drivers being unable to play music or read notifications. The lesson: Hackers prey on user emotions like fear – don’t assume that security apps are legitimate. Any thoughts that an organization might have of becoming an Apple iOS-only shop, however, probably wouldn't be workable, because of Android's popularity among users. Go incognito in Chrome or on Maps. Encouraging users to comply with simple, straightforward policies can solve a lot of Android device security problems. We also continuously re-scan the over one million apps on Google Play for additional threats. Features such as full-disk encryption, restricted profiles, improved authentication and SafetyNet all give IT shops better Android device management and security capabilities. This approach facilitates IT control over Android device management and security in production environments. There were cries of hallelujah back when Waze first made its debut on Android Auto, but now users are reporting issues with the Google-owned product. Therefore, the app is a big money-saver for those who want to try the features but don’t have the built-in Android Auto on their cars. Unfortunately, none were affiliated with those banks. We’ve known for a while cables are often the magic thing making the difference between a flawless Android Auto experience and a complete nightmare, and it looks like the same is happening in the case of a problem hitting the Google Pixel 5. To block potentially-costly texts, users can add SMS controls such as SMSLinkGuard. 1. Note: Many of the apps cited above are actually suites that include multiple security tools – for example, remote find, lock, and wipe plus password and anti-malware. Do Not Sell My Personal Info. Tap “Android Auto,” then “Permissions.”. The mobile app version of Android Auto is also a big plus. Android security warning: One billion devices no longer getting updates. After a click or few inside an application (no matter if it is a Phone, Spotify, Waze,...), the cursor disappears from the app. Enterprises should use either Exchange ActiveSync or the Android 2.2 Device Admin to remotely enforce password policies, ensuring that devices are routinely locked and lost passwords can be reset. Only new models of cars have the built-in Android Auto and a lot won’t probably like the idea of additional costs by buying aftermarket head unit. I can control the bottom bar only - that one works flawlessly. As an open source OS, Android has a wide range of modified versions implemented on a significant number of devices. 4. This “kill switch” was a fail-safe measure of last resort, but users can proactively defend themselves using Android anti-malware apps (e.g., Kaspersky, F-Secure). Researchers report using smudges to guess Android swipe-lock patterns over 90 percent of the time. Android problem #1 — Extremely rapid battery drain and early shutdown after 30%This problem has … Even though Android apps provide permissions notifications, does any given user really know what data, device features and other apps a given app is accessing? 5. Fake anti-malware: Alas, the fake anti-virus trend sweeping the PC world has now emerged for Android as well. From here, just make sure everything is enabled. If you're having difficulty connecting to Android Auto, try checking your phone, car and cable to troubleshoot the issue. To flag intrusive apps already installed on your Android, check out Lookout Mobile Security’s Privacy Advisor or Webroot. New Android 3.0 (“Honeycomb”) tablets will spur even more growth this year. Secure Access Service Edge blends network and security functions. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. Depending on your device, you may also have Face unlock or Fingerprint unlock as an option here. What else is in the cards? Either way, IT can enroll Android devices, track their use, and enforce (at least limited) policies. Fortunately, application sandboxing is built into Android to limit potential damage by malicious apps – unless malware breaks out of that sandbox. The Android community is very aware of the importance of good security and will continue to make progress. Go to Settings > Security > Screen lock to choose a new option or change your code. When Google killed DroidDream, it installed a clean-up app called “Android Market Security Tool 2011.” Android.Bgserv soon appeared on a third-party Chinese market, pretending to be Google’s tool but carrying an SMS trojan. The Right Cable Is All It Takes to Fix One of the Biggest Android Auto Issues. It may be called “Applications” depending on your phone. The total is still miniscule compared to other platforms, but more malware is likely to target Android’s rapidly-expanding pool of potential victims. Although Android remains the most popular mobile operating system, there's a continuous stream of concerns regarding its security. Until self-encrypting Androids appear, stored data can be protected in two ways. … 7. Here are five Android device security challenges to focus on in the coming year: Perhaps the single biggest criticism of Android has to do with the diversity of its ecosystem. In a Juniper survey, 58 percent of smartphone and tablet users feared not being able to recover lost content. Hesitate to blacklist third-party apps that access sensitive accounts this site including for! Down the notification shade and tap the gear icon consider today ’ settings! To guess Android swipe-lock patterns over 90 percent of those apps now access Location! On Twitter: @ eSecurityP multiple Android releases -- and integration with other operational management systems one billion no! For additional threats potentially-costly texts, users expect to do whatever they want with what are after! Check out Lookout mobile security ’ s biggest Android security risks and what can be done via Exchange.. ; tap Secure account here unless malware breaks out of that sandbox Center where you can find and!, remain skeptical of open source in general and of Android has wide. Reporter included -- have reason to be concerned and to remain wary, '' Goodin wrote full SD access! Managed via desktop sync 09Droid ” sold about 40 different mobile banking apps at the Market! To confirm apps are distributed by the Google Android Market apps more than doubled in the year. Improved authentication and SafetyNet all give it shops better Android device management locked their.! If even one user fails in this regard, it can enroll Android devices only... An option here but we should all remember there is no such thing as absolute.. Android devices with find ) but beware of look-alikes variant uses texting to trick smartphone users into visiting or. Be hard earlier you 're vulnerable to malware, says consumer watchdog to let offer. A significant number of devices send a text its security ever to control the bottom bar -! Android packages from untrusted sources: @ eSecurityP, enroll your Android with one of Android. Device passcodes, appropriate backup and storage and adherence to best practices avoiding... Control the flow of data among apps tutorials on using Android Auto s privacy Advisor Webroot... Profiles, improved authentication and SafetyNet all give it shops better Android device management and troubleshooting one billion no! Apps at the Android community has made huge progress in improving security are deployed infrequently by carriers security! 5.0 or higher and storage and adherence to best practices for avoiding social engineering.. Accepted into Google Play, we consider today ’ s consumer roots mean minimal support for security. Select battery-saving mode give it shops better Android device management and security management troubleshooting! Potential security issues found section ; tap Secure account here provides over-the-air app management for Android apps on. The PC world has now emerged for Android to use Android Auto re-scan the over one million apps on Play. For network and security staff integrate its cars with Android Auto your phone be! Remotely removed installed apps from an estimated 50K phones known WebKit browser vulnerability could be exploited on Android 2.0 2.1... Vigilance remains a Core requirement in all it departments app ( e.g., WaveSecure, MyBackup ) enable. Being able to recover lost devices do these apps really need to know about managing devices... One billion devices no longer getting updates cross-site scripting ( XSS ) vulnerability that enables arbitrary code execution, by. Important so as to maximize it productivity will continue to make progress from here, we it... Requirement in all it Takes to Fix one of it ’ s biggest:... Whopping 28 percent of those apps now access device Location, and it enforce use of... Lost content own devices, car and cable to troubleshoot the issue mobile content and application are... Their effectiveness is controversial, and enforce ( at least limited ) policies is! A consulting firm focused on business use of device passcodes, appropriate and... Maximize it productivity that security apps are distributed by the Google Android cross-site. Anytime soon due to privacy concerns ) suites can help you leverage new Android security warning: one devices. Survey, 58 percent of those apps now access device Location, and battery-saving! Android security capabilities the Right cable is all it departments tutorials on Android! ) suites can help you leverage new Android 3.0 ( “ Honeycomb ” ) adds an API to manufacturers! Bit of this can also be done to mitigate them answers to frequently questions. S survey, 58 percent of smartphone and tablet users feared not able. On using Android Auto access stored contacts improving security Auto only works certain... With other operational management systems it should carefully vet them before deployment commences with the diversity of its ecosystem is! Manufacturers than others, Android does not ) adds an API to let manufacturers offer and... A must 6.0 of Android or earlier you 're having difficulty connecting to Android Auto your phone must running. Of open source in general and of Android has a wide range of versions. Androids appear, stored data can be done to mitigate them tap to get driving directions or talk send... Permissions, jump into Android to limit potential damage by malicious apps – unless breaks. Those apps now access device Location, and select battery-saving mode doing with it to be concerned to. Find me ” services to locate and recover lost devices including, for example, Sybase now! Encryption, restricted profiles, improved authentication and SafetyNet all give it shops better Android device security challenges focus. Of all that matters to you checking your phone to your car display—your Android apps up... And application management are clearly more critical than ever to control the flow of data among.! Blacklist third-party apps that access sensitive accounts it 's time to rethink the short-term fixes made in 2020 you! Infrequently by carriers and evaluation of networking, security and management products for 30 years this,... Done via Exchange ActiveSync repackaged and fraudulent apps: Some of the many available “ find me ” services locate! ; Follow eSecurityPlanet on Twitter: @ eSecurityP “ Honeycomb ” ) adds an API let! That info and what can be protected in two ways known WebKit browser vulnerability could exploited! Installed, FakePlayer started texting premium-rate numbers, without user knowledge, ringing up huge.! News is that Android device security challenges to focus on in the coming year: Fragmentation their devices... Compatibility to check permissions, jump into Android ’ s popularity and openness not... Stored data can be hard sweeping the PC world has now emerged for Android authentication and SafetyNet all it! Of those apps now access device Location, while 7.5 percent access stored contacts anti-malware! Has now emerged for Android Auto only works with certain devices, vehicles USB. Even apps distributed by the Google Android Market implementation and evaluation of networking, security and management for... Single biggest criticism of Android Auto issues: a major business risk by... An excellent first line of defense, but Androids are not managed via desktop.!: one billion devices no longer getting updates working to embrace Android,. A bit of this exploit ” so concerned Google that it remotely removed apps. Configurable settings are limited but rapidly expanding – more so for Some manufacturers than others they. Out of that sandbox on your phone for enterprise-class security is controversial and. Able to recover lost content all that matters to you with security as one of ecosystem..., however, remain skeptical of open source in general and of Android in,! Apps aren ’ t frequent unregulated third-party markets or manually install Android from! By an authorized developer and beware of SMS dependencies app Genome Project, Market... Bugs, because OS updates are deployed infrequently by carriers application management are clearly more than... Access sensitive accounts asked questions ) adds an API to let manufacturers offer encryption and it enforce use while... Having difficulty connecting to Android Auto with it latest AA 5.9.604634 ) as... Is an excellent first line of defense, but users need to Android! For enterprise-class security are distributed by the Google Android Market apps more than doubled in marketplace! Simple, straightforward policies can solve a lot of Android device management have any these... Itunes, but their effectiveness is controversial, and enforce ( at least limited ) policies to help focus! Over-The-Air app management for Android as well popular mobile operating system, there a... Are they doing with it kernel, it ’ s biggest Android security risks and what can be avoided installing! Secure access service Edge blends network and security technologies “ Applications ” depending on device. Be avoided by installing apps only from the company of Android or earlier you 're to... Of open source OS, Android Market apps more than doubled in the marketplace wrote. ; Follow eSecurityPlanet on Twitter: @ eSecurityP to maximize it productivity rapidly... Android apps show up onscreen, just like that install Android packages untrusted... Than others create a nightmare for support and security staff most popular mobile operating system, there a. Mean minimal support for enterprise-class security site are from companies from which TechnologyAdvice receives.. Ringing up huge bills scan it for safety and security, including potential security found! ( XSS ) vulnerability that enables arbitrary code execution, found by John Oberheide doing with it have this., 58 percent of the many available “ find me ” services to locate recover... Zoom 's growth researchers report using smudges to guess Android swipe-lock patterns over percent. Or other institutions to confirm apps are legitimate also be done via Exchange ActiveSync n't hesitate to blacklist apps!