![]() ![]() With summer vacation in full swing, you’re likely out and about, using your smartphone or tablet to get answers on the go or check out the latest cool apps and games. Google took to their official blog after the Black Hat conference to help Android users with steps to protect their phone: Information, experts report, that may be worth serious money in underground markets. Turning on their phone activates this trojan app for use and it’s a free game of information retrieval. ![]() Once this trojan is firmly implanted, the user remains unaware. The hacker takes to third-party sites to advertise their app and wait for victims to start the download.įorbes shares that once a user downloads the rogue app, typically advertised free, the phone becomes infected and ready for a hack attack. The facade app can be named after a popular app, even labeled after popular downloads like Words with Friends and Candy Crush. Forbes notes Angry Birds is an example used by hackers for this malicious tool download. It helps the hacker to package the AndroRAT tool and make an app. Naturally, the next question leads to how a user becomes infected.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |