According to the company, these data confirm the growing interest among cybercriminals to attack mainly Android, which reached 10 million in January malicious applications.
distribution platform for mobile malware
On January 30, 2014, the company recorded nearly 1.2 million applications Google Play, not counting in unofficial shops, where there are many others. In many cases, these cybercriminals use legitimate software esas shops available for your Android malware can infect and users who downloaded them.
In most cases, the malicious programs aim to steal financial information from the user. This is the case, for example, mobile version of Carberp, Trojan that originated in Russia. This malicious file that steals user credentials are sent to the server banks. According to analysts at Kaspersky Lab, most of these malicious Android applications are developed in Russia.
To prevent infection of mobile devices from malicious applications, Kaspersky Lab specialists recommend following these tips:
- not enable “Developer options” in the device
- not enable “install third party apps”
- Only install applications from the official stores
- When installing new applications, check what access rights they request
- Use security software on mobile devices
For more information visit the study of mobile threats in 2013.
Enjoy the Administradores.com
on Facebook Follow on Twitter
Administrators to Receive Free Newsletter Administrators
- class=”clearfix”>
-
Technology
Mobile is already the second most used equipment for radio, pointing IBOPE MediaResearch shall report the listeners web broadcasters, among other new features
-
Technology
Revenge porn: Justice is prepared?
criminal Grading was proposed, but is not expected to vote; Justice only based on case law
-
Technology
screams in silence: stories of those who survivedLarissa, Holly and Annmarie were born in different times and cultures, but shared the same nightmare: being the victim of Revenge Porn
Technology
By downloading the application, user is in the palm of the information in accordance with its geolocation
Loading …
Share
readings?
No comments:
Post a Comment