RSS

Hacked Websites becoming a source of Android Malware




android trojan
This is a guset post written by Stella Rabecca.
Android users are in danger as now they are being open to a Trojanthreat. A new Android Trojan known as “NotCompatible” is being spread through affected websites. Even though the threat isn’t so secure, security providers are now in shock. This is officially the first time hackedwebsites are now being used to target cell phones as well. Lookout insists the malware can even be put to use to break into private networks through an infected Android device.
The Trojan basically functions by automatically downloading anapplication from a compromised website through the Web browser. This process is basically known as a “drive-by-download”. The mobile device then puts forward the notificationto the cell phone user to install the downloaded app. Here is another point, for the app to be successfullydownloaded, the “Unknown sources” setting must be switched on the device or the installation is blocked.
Samples looked into by Lookout reveal that the malicious Trojan can also go on to gain entry into private networks thus it is a probable threat in the future. Lookout stated in a post yesterday that a device infected with NotCompatible could be utilized to gain access to normally protected systems or information. These systems can be maintained by enterprise or government.
There have been some websites that have been affected but have little traffic so far. The malware actually requires the user to install a program known as “Update.apk.” Since there are so many things that have to be done before the malware actually becomes functional on the computer, Lookout doesn’t hope for much of an effect to the Android users at this point.
Phones vulnerable to attacks and viruses can be kept secure from a lot of methods. Good news for Android users is that Android phones are now compatible with many of the spyware application available out there. Mobistealth and Mobile Spy are few of the few names behind spyware apps that are compatible with Android. These apps work to monitor all the activities done one and through the phone. Apart from that, they are a great security tool as they inform the installer in case of SIM change and locate the exact location of the phone in case it’s misplace or stolen.
It was speculated that the number of free Android apps is increasing and surely doesn’t seem to get smaller. These apps don’t really have dangerous name that the user can guess that it’s malware and won’t install it. Names like “Quick Notes” or “Chess” seem really innocent and thus can trick a user into getting their Android affected.
One way users can make sure to keep their Android f=safe is to check the publisher of the app that they aredownloading. If the publisher offers a big variety of apps check to see if any of them look fishy. If the name or the apps don’t seem very decent to you, it is best to stay away.
Another thing Android users can learn from are the online reviews. Android Market reviews may not be the most authentic source of evidence however you can always confirm on reputable Websites. These Websites tell you all about the app and thus you can be informed before you download it.
Being a smart Android user, you should always check app permissions. Many users just go on accepting and don’t read what the app is asking. An alarm clock app shouldn’t be concerned about your list of contacts thus you should see if the app is requiring more than it needs, it’s a good idea to not download it.
With all the Trojans and Malware out there, users can be smart and think before they install anything on their phone.

Author Bio: Stella Rabecca has been in the business of providing quality information on Mobile Phone Monitoring. Her main expertise lies within the spectrum of Blackberry Tracking softwarewhich are making waves in the technology world today.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

0 comments:

Post a Comment

ADF.LY

                                                                                                                                                                 
                                                                                                                                                                 
                                                                                                                                                                 
  2 hea   ack 2        ck             2 hea     k 2 he   Hac            k 2 hea         heart   k 2 he rtHack 2 he        2 h         2 heartHa     heartHack 2  
  rtHac    hear        hear         eartHack 2  eartH    2 h           heartHack        Hack    eartH  k 2 heartHac      artHa       artHack 2 h   tHack 2 hear  
    2      Hac        tHack        Hac    hear   ck     ar           rtHa   2 he          he     ck    eart     2 h      ck 2         k 2    rtH    2   art  ck  
   art     2 h       k 2 he        2      Hack   hea   ac            k 2    rtHa         tHa     hea    ck               heart        eartHack 2        ck       
   ck      rtH       ear Hac      art            Hack 2                    ck 2           2      Hac    heartH          tHa k 2       ack 2 hea         hea      
   heartHack 2      Hack 2 he     ck             2 heart                   hea           artHack 2 h    Hack 2         k 2 heart       heartHa          Ha       
   Hack    ear      2 heartHa     he             rtHack                  rtH             ck 2  e rtH    2 heart        eartHack       tHack 2 h         2 h      
   2 h     ack     artH    2 h    Ha       ar    k 2  ear               ck   hea         hea     k 2    rtH           Hack   hear      2    rtH  k      rtH      
   rtH      he     ck      rtH    2 h     ack    ear  ack             2 hea tHac         Hac     ear    k 2     tHa   2 h     ack     art   k 2 he      k 2      
  ck 2    rtHac  2 hear   ck 2 h   tHack 2 he   Hack   heartH        artHack 2 h         2 he   Hack   heartHa k 2  eartHa   2 hear  ack 2  eartHa     heartH    
  heart   k 2 h  rtHack   heartH    2 heart     2 hea tHack 2        ck 2 heartH        artHa   2 hea  Hack 2 heart ack 2    rtHack   hear   ck 2     tHack 2    
                                                                                                                                                                 
                                                                                                                                                                 
Scrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text GeneratorScrolling Glitter Text Generator