Since Android's unveiling in 2007, the platform has stayed true to its commitment to provide open and free source code. The source code is freely available to developers and device manufacturers who can, at their own discretion, install the software without worrying about the hassles of licensing fees.
The consequent reduction in fees allows device manufacturers to bring Android devices to the market at significantly lower prices than the competition, with the average price of an Android smartphone almost US$400 cheaper than an iPhone.
Android not only delivers cheaper smartphones -- it is the largest mobile OS in the world, used in everything from cars to watches to televisions. It dominates global mobile operating systems with a market share of more than 85 percent. That means one quarter of the world's population owns or makes use of an Android device. Still, the rise of new encrypted Android malware might bring an end to the world's fairytale romance with the platform.
Android owners last year were alerted to a new type of spyware that could be delivered via a WhatsApp call. Users barely had recovered from the fact that the most trusted apps could be vulnerable to attacks when last month, Android owners once again were alerted to dozens of Google Play Store apps that contained questionable permissions and hidden malware.
The alert came only weeks after another warning around the escalating reign of terror on personal data by data munching bugs.
The latest warning is not related to the Google Play Store, however, but to malware that comes preinstalled on Android devices. It not only auto-installs apps, but also renders the phone unusable when the user attempts to uninstall the preinstalled malicious software.
Thanks to the open source nature of Android, manufacturers can create custom versions of the OS on their devices with their own unique sets of preinstalled apps. As many of these apps fall outside the Google-managed ecosystem, users have to trust the device manufacturers to stay within the boundaries of permissions granted, and to treat any received data with the utmost respect for privacy.
Unfortunately, many manufacturers have proven to be unreliable in this regard, which prompted an open letter drafted by Privacy International and more than 50 other NGOs requesting Google to take action against apps that enable data exploitation.
Although the chances of picking up malware with any mainstream Android device using default settings are extremely slim, the threat from preinstalled malware on Android devices being supplied by unethical manufacturers is growing.
One of the devices most recently found to have the catastrophic preinstalled malware is the Unimax (UMX) U686CL. Offered on Virgin Mobile's Assurance Wireless program as part of the U.S. government's Lifeline Assistance Program (aimed at assisting low-income families to afford mobile services), it comes boxed for as little as $35.
Looking at the current personal and national financial statistics, it is easy to see why this device would be popular. Lifeline currently gives more than 9 million Americans access to a phone or data plan.
The Unimax (UMX) U686CL comes with two destructive apps -- and one can not be removed. One, called "Wireless Update," updates the phone. In fact, it is the only way to update the phone's software. Unfortunately, it also can auto-install apps without needing user consent, and it does so from the moment the unsuspecting user logs onto the device.
"While the apps it installs are initially clean and free of malware, it's important to note that these apps are added to the device with zero notification or permission required from the user.," said Nathan Collier, senior malware intelligence analyst at Malwarebytes. "This opens the potential for malware to unknowingly be installed in a future update to any of the apps added by Wireless Update at any time."
The updater app can be uninstalled by pressing and holding the app's notification, clicking on "more settings", pressing on the app's icon, and finally clicking "uninstall" on the app's info.
However, it is important to note that after taking this course of action, users no longer would be able to install any updates.
The other threat on these devices is the Settings app itself, which can not be uninstalled as it would render the phone completely unusable. Anyone currently using this device would be well advised to start looking for an alternative.
There are several critical steps that can be taken to protect networks from security threats that arise from connected mobile devices, but it all starts with the user.
If you're worried that your current Android device might be infected with malware, there are certain tell-tale signs to look for. The best Web hosting companies give tips and tricks on how to ensure fast and responsive websites across PCs and mobile devices.
So, if your Android smartphone or tablet is running more slowly than your 1995 desktop computer, chances are you've downloaded an infected app. A magnitude of pop-up ads that bypass your Google settings, and a hanging or flashing screen are other indicators that your device is under threat.