According to foreign media WarketWatch, a report released by Internet security company FireEye shows that 96% of malware on the Internet is directed at the Android system, and more than 5 billion downloaded Android applications are at risk of being attacked by hackers. The report shows that these malware are usually disguised as "benign" applications. In 2013, the number of malware targeting Android systems was 240,000, and in 2014 it increased to 390,000. FireEye said that one of the biggest threats to Android is that its mobile application communication information is transmitted back to the server. FireEye found that many of these messages are not encrypted, so they can be easily intercepted by hackers and inserted with malicious code to infect users. For a long time, the large number of "rough" Android applications in Google Play, the Google app store, have been criticized. From the lack of security in application writing, which can lead to hacker hijacking, to stealing information or making harassing calls, sending toll-inducing text messages, etc., Android users face a series of security risks. "You can take all the code and insert additional instructions to make it look identical to the original app, so that the average consumer can't tell the difference when they download it," said Jason Steele, director of technical strategy at FireEye. However, it's not just Android that is vulnerable, iOS is not immune, even for non-jailbroken devices. The researchers said that the growing popularity of iOS devices makes them a "valuable" target in the eyes of hackers. |
<<: Android is in chaos, Apple is king
>>: What did Baidu do with its 7 billion research funds?
These two days, Thunder can be said to have "...
Whether it is a decoration company website or oth...
Information flow advertising has developed rapidl...
According to CNBC, Goldman Sachs has released a r...
Try to be radically candid Kim Scott's entire...
Lazy Rabbit: Syndrome Dialectics of Cold, Fever a...
Introduction: Not many people mention APP SEO , a...
Overview 01Business Background and Purpose Genera...
Why join the WeChat Mini Program Development Comp...
Planning and production Source: Curious Doctor Ed...
Dear information flow optimizers , as you frequen...
This article is divided into three parts: 1. Full...
After the files and apps downloaded on the phone ...
Using ObjectAnimator ObjectAnimator is a powerful...
Download link of "Su Mang: Live a Beautiful ...