20,000 malicious apps hawked on droid store

Powered by SC Magazine
 

The number of malicious apps doubled in 30 days.

The number of malicious applications on the Android marketplace doubled from 10,000 to 20,000 in just one month.

According to research by Trend Micro, in the first three months of this year, it identified 5000 malicious applications, a number which has spiked more than four-fold over subsequent months.

It said that the most common type of malicious app (accounting for 30 per cent of all those Trend Micro encountered) is one disguised as a highly popular legitimate app.

It also recommended users to avoid 'spy' apps that allow attackers to spy on the device by monitoring its GPS signal and reading any text and address book information.

Two of these types of threats, named Spy Tool and Spy Phone PRO+, were recently spotted by Trend Micro as downloadable apps in Google Play.

Trend Micro security research director Rik Ferguson said there was "sustained and focused criminal interest" in Android.

“Criminals have always followed user behaviour and they continue to do so.”

Eset senior researcher David Harley said the figures were "higher than the company will be comfortable with".

“...unless it tries harder to regulate other outlets, malware authors have too many windows of opportunity to exploit compared to Apple's hard-line policy on outlets".

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


20,000 malicious apps hawked on droid store
 
 
 
Top Stories
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
A call for timely reporting
[Blog post] Businesses need incentives to keep customer data secure.
 
Doubts cast on Queensland's ICT Dashboard
Opposition, former Govt CIO say it can't be trusted.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  29%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 859

Vote