Sophos says that Google was notified about the apps and they seem to have been removed-the underlying threat and coding techniques will remain in other as yet unidentified apps in the store and the myriad apps likely still to come. Sophos believes that similarities in coding structure and user interfaces suggests this batch of apps might all be related, despite appearing to come from different publishers. And, arguably, the most worrying finding is that all 15 apps appeared this year-that means there are still gaping holes in Play Store security and there are adware factories churning out such apps and pushing them into the public domain. ![]() Once installed, the apps use innocuous names to ensure they don’t trigger suspicions. The mindset to download an app of unknown provenance for such a delicate purpose we won’t get into-the warnings here basically go without saying. ![]() “Most ironically,” Sophos reports, one of the malicious apps is designed “to scrub your phone of private data.” You couldn’t make this up. As so often with adware apps, most are designed around trivial utilities-QR readers and image editors, for example.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |