Android is currently the most often attacks, the mobile operating system in the world. What’s worse, the number of new types of attacks and malicious code infected device running Android is growing rapidly. The interest of cybercriminals mobile platform this is, of course, with the growing popularity of this system among users of smartphones and tablets. In accordance with the report Gartnera more than 86% of mobile users use Android, and less than 13% are using iOS. The company F-Secure, one of the most popular manufacturers of protective software on all the platforms, system, said that the last time gets to analyze more than 9 thousand infected samples. A day.
Android is far and away the most atakowaną mobile platform. German independent antivirus lab AV-Test provided statistical data on the number of attacks on mobile devices running this system. Recorded a total of over 15 million malware samples since January 2013. On the dynamics of growth in the number of attacks is evidenced by the rapidly growing number of threats lately. For comparison, overall in 2015, the laboratory has recorded around 4.5 million infected files, and this year, in August there were already more than 7 million.
the Problem all intensive attacks performed by intruders to owners of devices running the Android operating system is mainly due to the lack of mass, regular software updates. Despite the fact that officially on the market we already have Android 7.1.1., it’s in August 2016, at 18.7% of users of smartphones and tablets was on their devices running Android 6.0 Marshmallow, and the vast majority of the rest still uses a much older varieties of this system of the mobile device. In the case of iOS this problem doesn’t exist – just a few days after the release of a new version of the system software, installs them, more than half of mobile users of Apple technology.
in Particular, a record number of attacks using malicious software was conducted between may and July of 2016. In Jun anti-virus laboratory received up to 1.5 million infected samples for analysis. In one month, therefore, there were so many threats that 1/3 of 2015.
Android or at least the most common types of threats
it is also Important that the level of differentiation of threats Android. In 2015, the 10 most common malicious apps accounted for 25% of malicious software designed to attack this mobile. The dominant form of attack was malicious code, sending an SMS with increased payment. Leaders in this group of threats lived SMSSend. What was the “earnings” cyber criminals? An attacker would first have registered your number with increased pay, then the infected device automatically sends out SMS messages to this number, and the fee for such news brought by victims of attacks zasilały account of the attackers.
this year, the growing popularity of a different kind of danger – Slocker is a software of type of ransomware. the Effect of this code is to encrypt files on a mobile device (documents, photos, videos, files, etc.), and then display a ransom in exchange for decryption. Attention! What the cybercriminals demand a ransom victim absolutely does not give any guarantees that after their admission would actually recover the data! For example, Slocker charges 500 bucks for unlocking access. As if that wasn’t enough, cyber criminals are blackmailing the victim by showing the message that they are attracted they a photo of the user and know the exact position of the victim.
Android or at least how to protect themselves?
it is the Basis of preventive measures. Strict adherence to the following three simple rules will allow us to significantly reduce the chances of infecting your equipment, running Android.
- Install software only from the official Google Play store; lock in the system and the ability to install apps from unauthorized sources.
- Install it on your smartphone and/or tablet the antivirus software (recommend you to read our material: What antivirus for smartphone)
- if necessary, are unknown to us, or an unsecured wi-fi network always use the VPN software that provides encryption of the connection in the Network.
No comments:
Post a Comment