96% of mobile malware targets Android: More than 5 billion apps can be attacked

96% of mobile malware targets Android: More than 5 billion apps can be attacked

The report said that 96% of mobile malware targets Google's Android operating system, and these malware are usually disguised as "benign" applications. FireEye found that in the second half of 2013, the number of malicious applications targeting Android systems designed to steal users' financial information increased fourfold: in December 2013, FireEye found more than 1,300 different financial malware samples, while in June 2013, this data was only 260.

[[128300]]

FireEye reported that for a long time, the large number of "rough" Android applications in Google Play, the Google app store, have been criticized. From the lack of security in application writing, which can be hijacked by hackers, to stealing information or making harassing calls, sending toll-inducing text messages, etc., Android users face a series of security risks.

The security industry has warned for years that people spend a lot of time on mobile apps for personal and commercial purposes, but their phones are not protected and many people do not install protection software on their phones. FireEye said, "Attackers always find new ways to break in, and mobile security is still in its infancy."

The report also said that criminals created a mechanism through internal iOS applications set up by Apple for its employees, allowing them to bypass the company's review process, thereby trying to focus more on Apple devices. FireEye said that this "tactic" will be very tempting for attackers in the future.

<<:  Various styles of gesture sliding Cell

>>:  Hard constraints on software development

Recommend

10 types of short video titles with high click-through rates, just use them!

In addition to attracting clicks, a good short vi...

Keep product experience report, tell you the secret of user growth

1. Experience the environment Test model: iPhone6...

5,000 words in-depth analysis of Meituan’s 8 major user growth models!

As we all know, the growth of an enterprise is cl...

Operational skills of Alipay products!

It turns out that Alipay is not only a payment pr...

Welcome home! What innovative technologies will help Shenzhou 15 return home?

On June 4, the return capsule of the Shenzhou XV ...

Solid info! 5 major customer acquisition models for APP promotion!

I used to think about this question often when I ...

A comprehensive explanation of the Android advanced view coordinate system

Preface First of all, I wish you all a happy Nati...

Trump's unexpected election as US president reveals his shady career history

The US presidential election finally came to an e...

The value that big data and artificial intelligence bring to advertisers

1. All these different moments combined can indic...

How to find cooperation channels with anchors who sell products?

How to find cooperation channels with anchors who...

ZTE explains how to access the Internet on airplanes

Regarding the "Air China provides in-flight b...