Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean.

It is important to understand that these permissions are not ambiguous by accident. Due to the various responses that different users will have to a request to access certain parts of the device (like the camera, for instance), developers have taken to describing the possible effect of an application’s access, instead of simply saying what it will be accessing.

Therefore, you may find yourself giving your applications permission to access and even alter more than you realized, simply because the permissions your apps have requested didn’t give you a clear idea of what they entail. This can be risky, especially if the app in question was created by an unscrupulous developer seeking access to your information.

If you see the following permission requests, know that they are considered and classified as “Dangerous.” The reasons that these permissions could put your security at risk are included.

  • Phone permissions -- These permissions give an app the ability to interact with your calls and call history however the developer wants it to. As a result, the app can make calls (including those that use Voice over Internet Protocol, or VoIP), as well as read and edit your calls list. An app with these permissions can also read your network information to collect data on the calls that you have made, and can even redirect your calls or hang up the phone. Essentially, phone permissions give an app control over the primary function of a cellular phone. While this may sound frightening, it is important to realize that this permission is often asked for so that any app you may be using when you receive a call can be paused. As a result, this is a permission that many games and multimedia apps will ask for.
  • SMS permissions -- These permissions give an app the ability to both send SMS messages and read any that are incoming. Not only does this present some obvious privacy concerns, it also means that a criminal could leverage this access to add paid services to your account without your consent.
  • Contact permissions -- As with any of the permissions on this list, there are completely aboveboard reasons that an application would require access to your contacts, as well as the ability to edit them. However, in the wrong hands, your contact list becomes a resource for a spammer to pull their next victims from. It is also important to consider that these permissions grant access to any accounts that your apps use, including Facebook, Google, and others.
  • Calendar permissions -- With these permissions granted, an app can read, edit, and create events in your calendar. However, this also means that an app can review your calendar without restriction, with the ability to edit or remove anything they want.
  • Camera permissions -- These permissions, perhaps obviously, allow an app to utilize your phone’s built-in camera to capture images and video. However, these permissions don’t specify that the app has to necessarily be in use to do so, allowing the app to potentially record your life whenever it wants.
  • Microphone permissions -- Just as the camera permissions allow an app to capture visual content, microphone permissions allow an app to use the onboard microphone to capture sounds and audio. Also like camera permissions, there is nothing that says the application has to be in use for it to do so, and so an app could potentially record anything your device could pick up at any time.
  • Storage permissions -- If granted these permissions, an application can read and write information to your phone’s storage, whether it's in the onboard storage or an added SD card. Like other permissions with the “Dangerous” label, this also means that the app can edit and remove files from your data storage. This is another common permission, as just about every app you download will likely need to store a small amount of your usage data. This includes services that save your login information, like Netflix, to games that store your progress, like Candy Crush Saga.
  • Location permissions -- These permissions allow an app to read your location at any time. Based on what the app is looking for, this location is either very exact (coming from GPS data) or a more general one (based on local Wi-Fi hotspots and cellular base stations). This could create a problem, as a criminal could potentially obtain your location history from the app and use it to establish your behaviors.
  • Body sensor permissions - These are not seen quite as often as other permissions, but you are apt to see them if you use certain accessories (like fitness trackers) and their associated apps to track your health data. These permissions allow the app to access that data. However, there permissions are not related to your device’s native movement tracking abilities.

It is important to remember that most applications that request these permissions are doing so simply in order to do what you want it to do. A messaging application without SMS permissions isn’t going to be able to do its job. Social networks, especially Instagram, need access to the camera in order to take the photos that you edit and share.

However, you should always consider why an app might request certain permissions, and if there is actually any reason that those permissions are necessary for the app to function. If the same messaging application were to ask for body sensor information, it wouldn’t be a bad idea to seek out a different app for your needs.

Make sure you subscribe to the Symmetric Engineering Group blog for more IT tips and best practices!

Hitman Email Scam Threatens Your Life, Instead of ...
Why ROBOT is a Risk After Nearly 20 Years
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Technology Best Practices Managed IT Services Cloud Business Computing Email Privacy Malware IT Infrastructure Management Hackers Hosted Solutions Business Continuity Internet IT Companies in Tampa Business Business Mobility IT Support Services Outsourced IT Data Backup Software Data Business IT Solutions Microsoft Network Security I.T. Management Productivity Managed Service Provider IT Professional Services Productivity Computer Custom Business Solutions Mobile Devices Tech Term IT Management Business Applications IT Business Solutions Ransomware Data Recovery Cloud Computing Innovation Technology Consultants Google Managed IT Service in Florida Hardware Business IT Support Managed IT Service Managed IT Internet of Things Android Windows 10 I.T. Support Managed Services in Florida Windows Disaster Recovery User Tips Communication Backup IT Risk Management I.T. Services Dynamic Solutions Workplace Tips IT Support Services in Tampa Browser Remote Monitoring Small Business Collaboration Holiday Upgrade IT Support Smartphone Smartphones IT Outsourcing in Tampa Data Management IT Services in Florida Encryption Managed Services Gmail Business Management IT Service Server Network Microsoft Office Save Money IT Support in Tampa Efficiency Social Media Artificial Intelligence Managed Services in Tampa Bay Mobile Device Management Passwords Phishing BYOD App Managed IT Services Cybersecurity IT Managed Services Mobile Device Paperless Office Windows 10 VoIP Vendor Management Applications Customer Relationship Management Tech Companies in Tampa Employer-Employee Relationship BDR Unified Threat Management Website communications Office 365 Antivirus Firewall Operating System Bandwidth IT Services in Tampa Bring Your Own Device Tampa IT Support Content Filtering Wi-Fi Chrome Tip of the week Government Small Business IT Solutions Managed Service in Tampa Apple Scam Computer Networking IT Outsourcing in Florida Word Two-factor Authentication Project Management Data Computer Services IT Service Management IT Company Business Plan Vulnerability Compliance IT Vendor Management Healthcare IT Outsourcing Risk Management Business IT Support Services Facebook Infrastructure Information IT Management Services SaaS IT Company Quick Tips Wireless Technology Retail Hosted Solution Robot Customer Service Money WiFi Document Management The Internet of Things Computer Hardware Repair Saving Money Remote Computing Data loss IT solutions Office Analytics Mobile Computing Unified Communications Data Security Blockchain Help Desk Settings Telephone Systems Miscellaneous Apps Data storage Automation Router Maintenance Wireless Storage Regulations Big Data Managed Service VPN Managed IT Outsourcing Administration IT Support Helpdesk Laptop IBM Alert IoT Downtime Access Control HIPAA Business Continuity Services Microsoft Virtual Server Hosting in Tampa and Florida Uninterrupted Power Supply Machine Learning Employees IT Management Service Licensing Internet Exlporer Training Company Culture Redundancy YouTube Printing Network Congestion Office Tips Virtual Desktop How To Search Google Drive End of Support Patch Management Computer Support Mobile Security File Sharing Computer Network Services Mouse Digital Payment Server Management Users I.T. Company Network Management Business Application Smart Technology Budget User Error Virtualization Social Computer Networking Services Flexibility Files Tablet Computing Solid State Drive Spam Remote Monitoring and Management Assessment LiFi Virtual Private Network Outlook Remote Workers Monitors Net Neutrality Augmented Reality Business Technology Virtual Reality Politics Recovery Mobility IT Companies in Florida Information Technology IT Consulting Presentation Spyware Disaster Resistance Computing Infrastructure Fun Managed Service in Florida Geography Cost Management Authorization Information Technology Consulting Legal Microsoft Business Solutions Modem Buisness Windows 8 Professional Service Corporate Profile Superfish Fraud Notes Mobile Favorites Drones Dark Data Intranet Legislation Identity Typing G Suite Tech Support Fleet Tracking Procurement Dark Web Hacker Server Hosting in Tampa Cache Electronic Health Records Going Green Social Engineering Experience Deep Learning Help Desk Support Automobile Health Test Tampa IT Services Address Point of Sale Password Monitoring Top IT Outsourcing Company Careers USB Proactive IT Alerts High-Speed Internet IT Consulting Services Shortcut Software as a Service Cookies Trending Asset Tracking Security Cameras IT Managed Service Provider Health Care IT Services WannaCry Co-managed IT Hacking Conferencing Consulting Services Servers Comparison Halloween Data Warehousing Recycling Cyberattacks Time Management SharePoint IT Technicians MSP RMM IT Consulting Service Outsourced Computer Support Hard Disk Drive CIO Samsung Star Wars Consulting IT Service in Tampa Jobs Data Breach Cooperation IT Support Companies in Tampa Development Undo Zero-Day Threat Software Tips Technology Tips Nanotechnology OneNote Remote Worker Computers Business IT Solutions Networking Chromebook Managing Stress Instant Messaging Service IT Specifications Social Networking Scary Stories Managed it Services in Tampa Travel Microsoft Excel Server Hosting History eWaste User Read Only Identity Theft Downloads Mirgation Identities IT Vendor Management in Tampa Sync Proactive Domains Tech Terms Screen Reader Utility Computing Best Practice Managed Services Provider Electronic Medical Records Computer Care Firefox Technology Laws Staff IT Support and Solutions Private Cloud Business Growth Cables Competition Backup and Disaster Recovery Google Docs Employee-Employer Relationship ROI Healthcare IT Display Full Service IT VoIP Hotspot Managed Services in Floirda Digital Signature Enterprise Content Management Hard Drives Finance Save Time IT Solutions for Small Business Statistics Black Friday Motherboard Sports Computer Repair Managed Service Providers Safety Marketing Disaster Management Avoiding Downtime Touchscreen Multi-Factor Security Migration Network Support in Florida Mobile Device Managment Public Speaking Theft Cryptocurrency Humor Distributed Denial of Service Smart Tech Heating/Cooling E-Commerce IT Tech Support Hacks Data Technology Unified Threat Management Operations Cortana IT Managed Service in Tampa Wires Human Error Cabling Tech Company in Tampa Meetings Digital Techology Language Education IT Company in Tampa Websites Vulnerabilities Authentication Backups Microsoft Affiliate Program Google Maps Bluetooth Cyber Monday Lenovo Permissions Gadgets Enterprise Resource Planning Bookmarks Google Wallet Google Calendar Chatbots Alt Codes Programming WPA3 Financial Bitcoin Break Fix Connectivity Hard Drive Features Technology Consulting Firms Current Events Writing Consultation Application Printer Wearable Technology Knowledge Help Desk Support in Tampa Permission Business Continuity Service Providers Server Hosting in Florida Mail Merge Twitter Webcam Personal Information Taxes Botnet Mobile Data Telephony How To Supercomputer Running Cable Tracking Regulation Processors CrashOverride Lithium-ion Battery Emoji Saving Time 5G Update Upgrades IT Budget Black Market IP Address Managed Servers Work/Life Balance Business Appplications Administrator Web Server I.T. Managament Cleaning Relocation 3D Printing Thank You Mobile Office Law Enforcement Notifications Hiring/Firing Motion Sickness Cameras Congratulations Emergency Gadget Printers Virus Staffing Error CCTV IT Consultant Refrigeration Unsupported Software Physical Security Cybercrime Crowdsourcing GPS Public Cloud

Latest Blog Entry

Are you a person that has traditionally written down things in notebooks? If you are, you probably have dozens of notebooks that are half filled with information, most of which you’ll look at sometime in the future and you’ll be reminded just how helpful that note would have...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login