Download Mobile Security Report 2014 - AV

Transcript
Product Review: Mobile Security ‐ July/August 2014
www.av-comparatives.org
The lower the score, the greater the number
of apps with dubious privileges that have
been detected.
Additionally, all installed apps are displayed
in a list. Tapping an app's entry in the list
displays all its privileges.
the process, a PIN of between four and eight
numerical characters has to be entered.
Additionally, details of a trusted person have
to be entered. He or she will be contacted in
the event that the SIM card is swapped, and
the phone number will be the only one from
which the wipe command can be sent.
Locate
Text-message command: BD-<PIN> LOCATE
The Locate function finds the position of a
lost or stolen device. The web interface
displays the location of the phone in Google
Maps. Continuously locating the phone is not
possible.
If text messages are used to control the
software, the sender will receive a text in
return that contains a link to the phone's
current location in Google Maps.
This has been well implemented, in our
opinion. App privileges are divided into
"Expected behaviour" and "Clues". This allows
even inexperienced users to evaluate the
information and decide for themselves
whether there is any evidence of spying by
the app. In this view, the app can be
uninstalled directly.
Web Security
Web Security protects the user against
common threats whilst surfing the Internet.
Bitdefender states that the product protects
against phishing, other types of fraud and
malware.
Scream
Text-message command: BD-<PIN> SCREAM
The Scream function sounds a shrill siren. The
device is not locked. The function thus serves
to help the user find the phone when mislaid,
rather than scaring off a thief.
Anti-Theft
Bitdefender's theft protection features can be
controlled by an elegant web interface
(http://my.bitdefender.com) The feature is
not activated by default, but can be enabled
quickly. The device has to be made a device
administrator in order to obtain the necessary
privileges
for
delete/lock
commands.
Bitdefender points out that the device
administrator status has to be deactivated
before uninstalling the product. To complete
Lock
Text-message command: BD-<PIN> LOCK
This command locks the device and protects
against unauthorized access. Bitdefender uses
the lock screen that is built into Android. This
does not allow Bitdefender's own logo or
messages to be shown, but has no securityrelated issues. It cannot be bypassed, and an
emergency call can always be made.
-30-