Can lunchers creates security flaws? - Security Discussion

I was wondering if theoretically (or not theoretically), app lunchers has the ability/access to create security flaws on a non-rooted device.
Thanks!

Related

[Q] General Android Security Question

Hello,
Seeing that latest HTC EVO scandal I'm beginning to understand how crappy Android security is.
Are you guys familiar with known mobile security products today? Such as Good?
My question is this:
Say I got an android platform (phone, tablets, etc.) that has a mobile security product implemented into it. For the sake of the argument, lets say its Good - a sandbox operated within the android OS implementing encryption and data protection.
Now, lets say that the device has vulnerabilities similar to the HTC issue. In fact, lets make it even worse - an unrooted device has an extreme vulnerability which may allow a user to take control of the system as IF the device was rooted.
Is there any theoretical scenario, in which someone who can take such control of the device, also takes control of the mobile security product processes and by doing so - manages to compromise the sandbox, as in - extract data from it?

[APP]aDosBox - still alive or any alternatives?

Downloaded the app and rather liked it, but it's very unhandy that you can't edit commands on startup. I want to add that functionality myself, but I see that there's no development since May 2011 (v. 0.2.4).
Is it time to fork the app? Or are there any other great DosBox Android ports, that I'm not aware of?

Can pre-installed aps (by the vendor) have root access in Android?

Hello All,
The topic name pretty much explains what i would like to ask. Is it possible to have an app pre-installed by the vendor (let's say telco operator who is selling it's customized phones) with root privileges?
I am not interested in rooting the phone from user perspective.
My question is mainly focused on idea, whether it is possible to sell android devices (on large scale) which have an application running with root rights without sacrificing security and Android integrity. And what would it require?
Why root privileges? We are looking into a possibility of creating a diagnostic app which will be analyzing a system malfunctions like screen freezing, screen lagging, etc.
Thank you

Android Security Testing

Dear Folks,
I am trying to pentest in my Android device in order to dive into depth of Operating System in order to analyze services. This is for to make sure whether there is any malicious app having access to microphone, camera and other services in my phone. Do you know what is the best way to do that? Can anyone show me an exact guide to it? Or, anyone who knows other methods to detect malicious apps in Android?
Look inside here:
A detection method for android application security based on TF-IDF and machine learning
Android is the most widely used mobile operating system (OS). A large number of third-party Android application (app) markets have emerged. The absence of third-party market regulation has prompted research institutions to propose different malware detection techniques. However, due to...
journals.plos.org

Removing anti emulator detection

How can I get around apps that crash when using emulators?
How much of a task would it be to patch the apk or is there something simpler I could do?
Look inside here:
Defeating Android Emulator Detection - Virtue Security
At some point while performing vulnerability assessments on android applications you will encounter apps that don’t want to be run within an emulator. We can’t blame application owners for wanting to ensure that the user interaction they see comes from genuine devices, but it doesn’t help us do...
www.virtuesecurity.com

Categories

Resources