Broad Anywhere is a recently identified technical vulnerability which has the potential to adversely affect the devices of almost each and every android user. Before proceeding with the discussion of the functionality and repercussions of BroadAnywhere, it is important to understand that it is not any sort of malware or virus (Lei, et. al., 2013). Rather, it is a software bug which is generally being occurred in the devices that are supported by Android Operating System. The vulnerability of the android’s devices from the bug is significantly severe that the occurrence of such bug could almost crash those devices or makes the devices restart all over without any user command to do so. Further, the bug could also forge any message sent by any person and could wipe out the data entirely that is contained in the android phone devices. BroadAnywhere Bug has been classified as Bug: 17356824 in the operating system code of Android.
Bug: 17356824 was an issue with Android phones because the application of these phones uses Intent Object to communicate with each other. One application gives PendingIntent to another app to allow it perform the task as specified by it. The Android’s add account settings required recognising the application that invokes it and the PendingIntent created for it. It enabled the invoker app to not merely send information regarding its identity but also enabled it to launch various services and broadcasts. So, it is easy for anyone to create an app which makes misuse of PendingIndent and make the Android phone go completely crashed or lose it entire data (N Recursions, 2015).
Nearly all the Android users are susceptible to the recently discovered bug which is known with the name of BroadAnywhere Bug (Dubey & Misra, 2016). The bug enters into the personal devices of the Android users through various ways without any user permission or command. The different methods that are being used by the BroadAnywhere Bug are discussed below:
Once the BroadAnywhere Bug is entered into the devices it has multiple ways of affecting the devices of Android users. Few of the ways are discussed below:
After learning about the repercussions of intrusion of BroadAnywhere Bug it is of utmost importance to identify the ways that can be used to prevent the Android phone devices from being affected from the vulnerabilities caused to them because of these bugs. There are several ways of protecting those devices against the BroadAnywhere Bug which are discussed below:
Regular device software updating:
In response to the severe problems identified and reported by the Android users, the developer of Android operating system introduced the updated its version which is being recognised in the market with the name of Android 5.0 Lollipop. It is the latest version of Android OS and it has the potential to fix the serious issues caused by BroadAnywhere Bug. Every version which is below the Lollipop version is still vulnerable to the attack of the said bug. The bug can only be found in the devices whose Android OS version is released before September 10 2014 (Mobile Apps, 2016). Any version that has been or will be launched further after the said date will not have to face the same issue as the operating systems of such devices are upgraded to provide security against such bugs.
References:
Mobile Apps, 2016. Remove BroadAnywhere: How To Delete BroadAnywhere Vulnerability From Android Phone. Available at: https://www.rizzoliandisles.org/remove-broadanywhere-delete-broadanywhere-vulnerability-android-phone Accessed on: 17.10.2018.
Pfleeger, C.P. and Pfleeger, S.L., 2002. Security in computing. Prentice Hall Professional Technical Reference.
N Recursions, 2015. Is Android’s BroadAnywhere really a threat that an antivirus can protect from? Do Android phones need antiviruses? Available at: https://nrecursions.blogspot.com/2015/01/is-androids-broadanywhere-really-threat.html Accessed on: 17.10.2018.
Hathaway, O.A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W. and Spiegel, J., 2012. The law of cyber-attack. California Law Review, pp.817-885.
Lei, L., Wang, Y., Zhou, J., Zha, D. and Zhang, Z., 2013, July. A threat to mobile cyber-physical systems: Sensor-based privacy theft attacks on Android smartphones. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on (pp. 126-133). IEEE.
Dubey, A. and Misra, A., 2016. Android security: attacks and defenses. Auerbach Publications.
Shan, Z., Neamtiu, I., Qian, Z. and Torrieri, D., 2015, October. Proactive restart as cyber maneuver for Android. In Military Communications Conference, MILCOM 2015-2015 IEEE (pp. 19-24). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download