Although we often blame exploit writers for developing malicious code for malicious purposes such as reading of one’s credentials, spying on a users’ communication and so on, we ought to blame ourselves periodically for allowing our android devices to be pregnant with malware.
This article briefly exposes four ways how users/employees unknowingly infect their android devices with malware.
Sideloading is a term referring to an android user intention to download apps from third-party stores instead of ”pulling” it from Google’s playstore. Most of these third-party store apps are infected with malware because there is no proper protection for apps installed on these stores. Thus, we recommend you download apps from Google’s playstore.
Most users/employees often fail too observe the list of permissions an app requires in order to function on android devices. Before an android app is installed on your android device, it declares a list of permissions that a user must accept if he/she is interested in the app. Malware take interest in loosely protected apps to retrieve users’ data back to a remote server.
“something-xxx antivirus is outdated. please download the current version” from xyz.com . We often see flashy updates on our mobile screens in a form of ‘Toast’ messages informing us about software expiration. Yes! software expires. But we advise users to download software directly from software vendors’ website.
This is one of the easiest ways even script kiddies could use to embedded malware into apps installed on your android devices. If a link on a particular topics interest you, just copy the link and paste it in the url section. It is quite safer than clicking on the link directly.
Avoiding these user-behaviors could save your android devices from malware lurking in the cyber world.
#ISA_informs #ISA_Ltd
Sign up our newsletter for update information, insight and promotion.