This is a guset post written by Stella Rabecca.
Android users are in danger as now they are being open to a Trojan threat. A new Android Trojan known as “NotCompatible” is being spread through affected websites. Even though the threat isn’t so secure, security providers are now in shock. This is officially the first time hackedwebsites are now being used to target cell phones as well. Lookout insists the malware can even be put to use to break into private networks through an infected Android device.
The Trojan basically functions by automatically downloading anapplication from a compromised website through the Web browser. This process is basically known as a “drive-by-download”. The mobile device then puts forward the notificationto the cell phone user to install the downloadedapp . Here is another point, for the app to be successfullydownloaded, the “Unknown sources” setting must be switched on the device or the installation is blocked.
Samples looked into by Lookout reveal that the malicious Trojan can also go on to gain entry into private networks thus it is a probable threat in the future. Lookout stated in a post yesterday that a device infected with NotCompatible could be utilized to gain access to normally protected systems or information. These systems can be maintained by enterprise or government.
There have been some websites that have been affected but have little traffic so far. The malware actually requires the user to install a program known as “Update.apk.” Since there are so many things that have to be done before the malware actually becomes functional on the computer, Lookout doesn’t hope for much of an effect to the Android users at this point.
Phones vulnerable to attacks and viruses can be kept secure from a lot of methods. Good news for Android users is that Android phones are now compatible with many of the spyware application available out there. Mobistealth andMobile Spy are few of the few names behind spyware apps that are compatible with Android. These apps work to monitor all the activities done one and through the phone. Apart from that, they are a great security tool as they inform the installer in case of SIM change and locate the exact location of the phone in case it’s misplace or stolen.
It was speculated that the number of free Android apps is increasing and surely doesn’t seem to get smaller. These apps don’t really have dangerous name that the user can guess that it’s malware and won’t install it. Names like “Quick Notes” or “Chess” seem really innocent and thus can trick a user into getting their Android affected.
One way users can make sure to keep their Android f=safe is to check the publisher of the app that they aredownloading. If the publisher offers a big variety of apps check to see if any of them look fishy. If the name or the apps don’t seem very decent to you, it is best to stay away.
Another thing Android users can learn from are the online reviews. Android Market reviews may not be the most authentic source of evidence however you can always confirm on reputable Websites. These Websites tell you all about the app and thus you can be informed before you download it.
Being a smart Android user, you should always check app permissions. Many users just go on accepting and don’t read what the app is asking. An alarm clock app shouldn’t be concerned about your list of contacts thus you should see if the app is requiring more than it needs, it’s a good idea to not download it.
With all the Trojans and Malware out there, users can be smart and think before they install anything on their phone.
The Trojan basically functions by automatically downloading anapplication from a compromised website through the Web browser. This process is basically known as a “drive-by-download”. The mobile device then puts forward the notificationto the cell phone user to install the downloaded
Samples looked into by Lookout reveal that the malicious Trojan can also go on to gain entry into private networks thus it is a probable threat in the future. Lookout stated in a post yesterday that a device infected with NotCompatible could be utilized to gain access to normally protected systems or information. These systems can be maintained by enterprise or government.
There have been some websites that have been affected but have little traffic so far. The malware actually requires the user to install a program known as “Update.apk.” Since there are so many things that have to be done before the malware actually becomes functional on the computer, Lookout doesn’t hope for much of an effect to the Android users at this point.
Phones vulnerable to attacks and viruses can be kept secure from a lot of methods. Good news for Android users is that Android phones are now compatible with many of the spyware application available out there. Mobistealth and
It was speculated that the number of free Android apps is increasing and surely doesn’t seem to get smaller. These apps don’t really have dangerous name that the user can guess that it’s malware and won’t install it. Names like “Quick Notes” or “Chess” seem really innocent and thus can trick a user into getting their Android affected.
One way users can make sure to keep their Android f=safe is to check the publisher of the app that they aredownloading. If the publisher offers a big variety of apps check to see if any of them look fishy. If the name or the apps don’t seem very decent to you, it is best to stay away.
Another thing Android users can learn from are the online reviews. Android Market reviews may not be the most authentic source of evidence however you can always confirm on reputable Websites. These Websites tell you all about the app and thus you can be informed before you download it.
Being a smart Android user, you should always check app permissions. Many users just go on accepting and don’t read what the app is asking. An alarm clock app shouldn’t be concerned about your list of contacts thus you should see if the app is requiring more than it needs, it’s a good idea to not download it.
With all the Trojans and Malware out there, users can be smart and think before they install anything on their phone.
Author Bio: Stella Rabecca has been in the business of providing quality information on Mobile Phone Monitoring. Her main expertise lies within the spectrum of Blackberry Tracking softwarewhich are making waves in the technology world today. |
0 comments:
Post a Comment