Although rooting or jailbreaking smartphones gives a user more control, ALEX MANEA, Director of BlackBerry Security warns that doing so can also leave the device open to additional security and privacy issues.
One of the most controversial topics when it comes to mobile devices is the idea of rooting and jailbreaking. Although rooting and jailbreaking are technically different processes on different platforms, the end-goal is the same: to gain higher-level privileges and access to sensitive functionality that isn’t normally available (for simplicity, we’ll use the word “rooting” to refer to both). Let’s look at the pros and cons of rooting and examine how and why we need to protect against it.
Rooting is a technical process driven by practical and philosophical desires. The practical aspect is that rooting lets you install apps that you wouldn’t otherwise be able to use, either because the platform is locked to a single app store (iOS) or because the app requires access to sensitive internal functionality (Android and iOS). Philosophically, some technically-minded people (including most white hat hackers) want the ability to access everything on their smartphones, which is why many Android smartphones come with unlocked bootloaders. But rooting is also complex for most people and can cause issues with system stability, software updates, warranties, and most of all security.
The Root of the Problem
The main advantage of rooting is also its biggest drawback: the fact that it unlocks access to sensitive areas of the device. Rooting is a huge risk to the privacy and security of the platform; a rooted device makes you more susceptible to malware and many enterprises refuse to allow rooted devices on their networks. Some types of malware specifically exploit jailbroken phones, while others attempt to directly root the phone themselves. These apps are extremely dangerous because they can hide from anti-virus programs and become nearly impossible to remove.
Preventing and detecting rooting is one of the most difficult games of cat-and-mouse in all of security. Hackers are constantly looking for new vulnerabilities and many devices are rooted before they’re even released. A well-designed piece of malware with super user permissions
can easily hide itself from a simple root-detection app that’s just looking for flags typically associated with rooting. The most effective way to detect rooting is to use a hardware root of trust to integrate the solution across the hardware, OS and app layers.
How to Protect Yourself and Your Business
The simplest way to protect yourself is to not root your device, but many devices can also rooted without your knowledge, either by malware installed on the device or in some cases even remotely. Whether you’re an individual consumer or an IT administrator tasked with protecting thousands of devices, there are some simple steps you can take to protect yourself and your business:
· When possible, use devices with built-in rooting protections; look for features like hardware root of trust and integrity detection. If all else fails, Google “how to root/jailbreak <insert device name>”. If you find lots of websites with simple instructions on how to root the latest OS, that’s usually not a good sign.
· Download apps from trusted sources. Native app stores like Google Play and BlackBerry World have built-in app vetting systems that protect against malicious apps. Third-party app stores are hit-or-miss, with many lacking the resources to implement robust malware detection.
· Be careful with free apps that request unnecessary sets of permissions. If a flashlight app needs access to your system settings, it’s probably be doing more than enabling the flash on your camera.
· As an IT administrator, deploy Enterprise Mobility Management solutions that detect and protect against rooted devices. Make sure you’re able to remotely track those devices and quarantine them from your enterprise network.
Mobile Security Tips
Here are some other simple ways to keep your information safe and make sure you don’t become a victim of cybercrime:
· Use a device password and that’s hard to guess. We often think of “strong” passwords as being long and having lots of strange numbers and symbols, but some smartphones automatically wipe after 10 incorrect attempts, so even a short simple password like “exoq” is often enough. Here’s a simple rule of thumb: if your partner or closest friend can’t guess it in 10 tries, you’re probably pretty safe.
· If you use your smartphone for work, use “containers” or other partitioning technologies to separate work and personal content. This keeps your personal data private and lets you download apps and play games. Meanwhile, your company knows that the apps that you download can’t access their corporate data or network, which protects them as well.
· When you’re on an insecure network (e.g. public Wi-Fi at Starbucks), make sure the data that you send and receive is encrypted. You can do this by looking for the lock icon on your browser or “https://” at the start of the URL and by using secure email services like Gmail, Yahoo and Outlook.com.
· Be careful when you let someone else use your phone. An experienced hacker can install spyware in a matter of seconds and start tracking all of your emails, texts and even phone calls. Try to keep an eye on the screen and never let the phone out of your sight.
Veeam passes $1bn, prepares for cloud’s ‘Act II’
The leader in cloud data management reveals how it will harness the next growth phase of the data revolution, writes ARTHUR GOLDSTUCK
Veeam Software, the quiet leader in backup solutions for cloud data management,has announced that it has passed $1-billion in revenues, and is preparing for the next phase of sustained growth in the sector.
Now, it is unveiling what it calls Act II, following five years of rapid growth through modernisation of the data centre. At the VeeamON 2019conferencein Miami this week, company co-founder Ratmir Timashev declared that the opportunities in this new era, focused on managing data for the hybrid cloud, would drive the next phase of growth.
“Veeam created the VMware backup market and has dominated it as the leader for the last decade,” said Timashev, who is also executive vice president for sales and marketing at the organisation. “This was Veeam’s Act I and I am delighted that we have surpassed the $1 billion mark; in 2013 I predicted we’d achieve this in less than six years.
“However, the market is now changing. Backup is still critical, but customers are now building hybrid clouds with AWS, Azure, IBM and Google, and they need more than just backup. To succeed in this changing environment, Veeam has had to adapt. Veeam, with its 60,000-plus channel and service provider partners and the broadest ecosystem of technology partners, including Cisco, HPE, NetApp, Nutanix and Pure Storage, is best positioned to dominate the new cloud data management in our Act II.”
Veeam has been the leading provider of backup, recovery and replication solutions for more than a decade, and is growing rapidly at a time when other players in the backup market are struggling to innovate on demand.
“Backup is not sexy and they made a pretty successful company out of something that others seem to be screwing up,” said Roy Illsley, Distinguished Analyst at Ovum, speaking in Miami after the VeeamOn conference. “Others have not invested much in new products and they don’t solve key challenges that most organisations want solved. Theyre resting on their laurels and are stuck in the physical world of backup instead of embracing the cloud.”
Illsley readily buys into the Veeam tagline. “It just works”.
“They are very good at marketing but are also a good engineering comany that does produce the goods. Their big strength, that it just works, is a reliable feature they have built into their product portfolio.”
Veeam said in statement from the event that, while it had initially focused on server virtualisation for VMware environments, in recent years it had expanded this core offering. It was now delivering integration with multiple hypervisors, physical servers and endpoints, along with public and software-as-a-service workloads, while partnering with leading cloud, storage, server, hyperconverged (HCI) and application vendors.
This week, it announced a new “with Veeam”program, which brings in enterprise storage and hyperconverged (HCI) vendors to provide customers with comprehensive secondary storage solutions that combine Veeam software with industry-leading infrastructure systems. Companies like ExaGrid and Nutanix have already announced partnerships.
Timashev said: “From day one, we have focused on partnerships to deliver customer value. Working with our storage and cloud partners, we are delivering choice, flexibility and value to customers of all sizes.”
‘Energy scavenging’ gets funding
As the drive towards a 5G future gathers momentum, the University of Surrey’s research into technology that could power countless internet enabled devices – including those needed for autonomous cars – has won over £1M from the Engineering and Physical Sciences Research Council (EPSRC) and industry partners.
Surrey’s Advanced Technology Institute (ATI) has been working on triboelectric nanogenerators (TENG), an energy harvesting technology capable of ‘scavenging’ energy from movements such as human motion, machine vibration, wind and vehicle movements to power small electronic components.
TENG energy harvesting is based on a combination of electrostatic charging and electrostatic induction, providing high output, peak efficiency and low-cost solutions for small scale electronic devices. It’s thought such devices will be vital for the smart sensors needed to enable driverless cars to work safely, wearable electronics, health sensors in ‘smart hospitals’ and robotics in ‘smart factories.’
The ATI will be partnered on this development project with the Georgia Institute of Technology, QinetiQ, MAS Holdings, National Physical Laboratory, Soochow University and Jaguar Land Rover.
Professor Ravi Silva, Director of the ATI and the principal investigator of the TENG project, said: “TENG technology is ideal to power the next generation of electronic devices due to its small footprint and capacity to integrate into systems we use every day. Here at the ATI, we are constantly looking to develop such advanced technologies leading towards our quest to realise worldwide “free energy”.
“TENGs are an ideal candidate to power the autonomous electronic systems for Internet of Things applications and wearable electronic devices. We believe this research grant will allow us to further the design of optimized energy harvesters.”