Latest Android upgrade delivers enterprise-grade security

Google's mobile operating system has been improved for enterprise users, but McAfee has found Android malware spreading via QR codes

The latest update to Google's Android mobile operating system enhances its security and functionality, making the platform more attractive to enterprises.

The update, known as Ice Cream Sandwich, improves Android security by simplifying the process by which applications manage authentication and run secure sessions.

According to a post made by Android's development team aimed at users and third-party developers, Google has introduced new cryptographic processes.

"A new keychain API [application programming interface] and underlying encrypted storage let applications store and retrieve private keys and their corresponding certificate chains. Any application can use the keychain API to install and store user certificates securely."

This makes it harder for hackers to access users' data, or to trick users into visiting malicious sites disguised as the web properties of legitimate companies or services.

The update also introduces the ability to randomise where Android devices store components of software installed on them. Known as Address Space Layout Randomization (ASLR), this makes it harder for hackers to find where their code has been stored once they have convinced a user to install it on their device. This limits what hackers are able to do with malware.

"Android 4.0 now provides address space layout randomization (ASLR) to help protect system and third-party applications from exploitation due to memory-management issues," wrote Google on the update.

Further security is provided by a new feature that enables administrators to remotely disable the camera.

"The platform adds a new policy control for administrators who manage devices using an installed Device Policy Manager. Administrators can now remotely disable the camera on a managed device for users working in sensitive environments."

There are also separate enhancements for third-party virtual private networks (VPN) developers, which is aimed specifically at enterprise users.

"Developers can now build or extend their own VPN solutions on the platform using a new VPN API and underlying secure credential storage. With user permission, applications can configure addresses and routing rules, process outgoing and incoming packets, and establish secure tunnels to a remote server."

Meanwhile, security firm McAfee has found that hackers are using QR (quick response) codes to distribute malware on Android devices.

"The latest Android malware uses QR code to distribute malicious links," wrote Arun Sabapathy, research scientist at McAfee Labs in a blog.

Once the code is scanned by a mobile device's camera, it prompts the device to open up the URL of an infected site, which immediately attempts to download malware.

Typically, this sort of malware is designed to attempt to send a high volume of SMS messages to premium rate numbers, which can quickly amount to large bills if enterprise users or device administrators are slow to check costs with their providers.

Sabapathy recommends that users preview URLs before allowing their devices to browse to unknown sites.

"Use a mobile QR code-/barcode-scanning app that previews URLs, and avoid scanning suspicious codes," he said.