• BlackBerry Spark AppSecure
  • Security library for Android applications
  • 0.7.915.0
ThreatType Enum Reference

The enumeration for types of threats detected by the runtime.

Public Attributes

 AppMalware =(0)
 Detect malicious applications or malware on an Android device. More...
 
 AppSideload =(1)
 Detect applications installed from an untrusted source on Android devices. More...
 
 DeviceSecurity =(2)
 Detect when device level security is compromised. More...
 
 DeviceSoftware =(3)
 Detect when the device operating system or security patches do not meet recommended standards. More...
 
 SafeBrowsing =(4)
 Detect when network or browsing requests are made to malicious links. More...
 
 SafeMessaging =(5)
 Detect when messages contain malicious content or links. More...
 
 NetworkSecurity =(10)
 Determine whether networking is subject to man in the middle attack. More...
 
 WiFiSecurity =(11)
 Detect if attached WiFi network is insecure. More...
 
 DeviceOffline =(12)
 Detect the device has been offline for an extended period of time. More...
 

Member Data Documentation

◆ AppMalware

AppMalware =(0)

Detects malicious applications or malware on an Android device using models built with machine learning to analyze the app package.

◆ AppSideload

AppSideload =(1)

Detect applications that the user has installed from untrusted source on Android devices. Sideloaded apps are installed manually rather than from an official app store. Applications not from an official app store pose a security risk.

◆ DeviceSecurity

DeviceSecurity =(2)

Device security encapsulates a range of checks to determine the security health of the users device. For example if the user has rooted or jailbroken the device, whether the disk is unencrypted, if the user has set a screen lock or if the device is running in developer mode.

◆ DeviceSoftware

DeviceSoftware =(3)

Detect when the device operating system version or security patches met the recommended security requirements. Devices running old versions of software pose a security risk. Detect whether the device model and/or manufacturer being used is listed as a prohibited device. For example, there might be a known security vulnerability in the Android software which was customized by a specific manufacturer.

◆ SafeBrowsing

SafeBrowsing =(4)

Detect when network or browsing requests are made to malicious links. Checks are performed use machine-learning capabilities and accumulated knowledge from threat intelligence feeds to provide an assessment of the safety of the URL. Use GD.SafeUrl::checkUrl to check specific URLs or IPs.

◆ SafeMessaging

SafeMessaging =(5)

ContentChecker.checkMessage interface detects when messages contain unsafe links. For example links to malicious websites, phishing attempts, malware, adware, and other web sources that pose a threat.

◆ NetworkSecurity

NetworkSecurity =(10)

Detect when the attached network is subject to a man in the middle attack and a rogue actor is attempting to compromise the connection.

◆ WiFiSecurity

WiFiSecurity =(11)

Detect if the attached Wi-Fi network is using a protocol whose encryption and authentication are not considered secure.

Detecting Wi-Fi network information requires location permissions in Android. Permission needs to be requested by the application and granted by the end user. The following permissions are required in the application's AndroidManifest.xml

  • android.permission.ACCESS_BACKGROUND_LOCATION
  • android.permission.ACCESS_FINE_LOCATION

If these permissions are not granted the Wi-Fi security check will be bypassed. If permission is granted after the application has started, the Wi-Fi security check will either run next time the application is opened, or when the network connection changes on the device.

Note: BlackBerry Spark AppSecure SDK does not collect any location information. Due to the SSID of a WiFi network providing some information about a device's location, Google requires that end users explicitly grant this permission.

◆ DeviceOffline

DeviceOffline =(12)

Detect when the device has been offline for an extended period of time. This poses a risk due to the runtime library being unable to obtain new threat rules and models from BlackBerry.