Skip to main content

Mobile threats: Android most vulnerable

          
        Kaspersky Lab in a recent statement said that mobile users were actively searching for software from suspicious sources and taking no precautions when launching an unknown programme - all of which makes it easier for cybercriminals to infect devices.
            Kaspersky Lab's key mobile forecast for 2012 had said that cybercriminals indeed focused their attention on the highly popular Android platform, and the number of threats for it continued to grow at a rapid pace. In January 2012, the lab had less than 6,000 unique malware samples for Android in its database, but the year ended with an astounding figure of 43,000+ malicious programmes. Over 99% of new threats found in 2012 targeted Android-based smartphones and tablets, with less than 1% aimed at devices running Symbian and BlackBerry operating systems or supporting the mobile version of Java.
The statement said that the most widespread Android threats can be divided into three major groups: SMS trojans, stealing money by sending premium texts, adware, and exploits to gain root access that give full access to the device and any data stored on it. Another notable addition to the Android malware family was a new mobile botnet nicknamed Foncy that enabled cybercriminals to gain control of mobile devices.
       Despite the limited number of new malicious apps for Symbian and BlackBerry smartphones, some of them are notable for specifically targeting victims' bank accounts, it said. In 2012 the lab's experts recorded new versions of trojans such as Zeus-in-the-Mobile and SpyEye-in-the-Mobile that combine forces with their 'desktop' malicious counterparts to seize control of users' online bank accounts.
Courtsy : techgig.com

 

Popular posts from this blog

Odoo - sassc: error: no such option: --stdin

 Python - Issue Fixing   The style compilation failed, see the error below. Your recent actions may be the cause, please try reverting the changes you made. Usage: sassc [options] SCSS_FILE [OUT_CSS_FILE] sassc: error: no such option: --stdin This error occured while compiling the bundle 'web.assets_common' containing:     - /web/static/lib/bootstrap/scss/_functions.scss     - /web/static/lib/bootstrap/scss/_mixins.scss     - /web/static/src/scss/utils.scss     - /web/static/src/scss/bs_mixins_overrides.scss     - /web/static/src/scss/primary_variables.scss     - /web_editor/static/src/scss/web_editor.variables.scss     - /web/static/src/scss/secondary_variables.scss     - /web/static/lib/bootstrap/scss/_variables.scss     - /web/static/lib/tempusdominus/tempusdominus.scss     - /web/static/src/scss/fonts.scss     - /web/static/src/scss/ui.scss     - /we...

Nebosh IGC Result - December 2021 Exam

  How to Check Nebosh IGC Result - Dec 2021 Exam  There are mainly 2 ways you will know your Nebosh result. The first method is you will recieve email from nebosh with your result. Nebosh will send email to all the registered candidates so it will take upto 48 hours to recieve your result. So dont worry if your result is not came and your friends came. Second methos is you can contact your institute for the result, they will recieve all the candidates result from nebosh tell your name and details they will tell your result.

AppsGeyser Android App Builder

AppsGeyser Android App Builder                 AppsGeyser is a free online platform that enables web publishers, video channels and radio programs to create custom mobile applications for Android. All Android apps developed through AppsGeyser’s platform can be distributed and exchanged online, through the AppsGeyser App Marketplace or in the Android App Store.           The AppsGeyser Android app creation platform has 2 steps to create an app, and most apps can be created in under five minutes.  Distribution and monetization options are offered within the platform  and the AppsGeyser Blog focuses on giving app makers How-To and App Marketing advice. It also offers users the ability to create apps by calling a web service through the Appsgeyser API.                                         Read...