Google Android has very quickly become comparable to Windows in the 90s – very fashionable. Not just with the application users but also the number one in usage with cyber crooks. The latest statistics indicate that the smartphone market share is now standing at over 60 per cent but sadly every day researchers are uncovering new malware strains that are designed to spy, steal and extort money from unwary users. Android phones can get contaminated by the established means like when the user has clicked on a malicious email link or on the numerous social networking websites; they open deceitful attachments or visit web pages that are infected.
Before getting into the threats, it should be noted that transferring your files off of your Android and doing a cleanse on your phone is one of the best ways to minimize loss. A great resource about how to do a file transfer from your Android is this site; androidfiletransfer.net/
Malware is typically hidden within seemingly legitimate applications that are frequently designed to appear like free or cheaper versions of trendy software for pay such as Android phone mobile games, so as to lure the prey to download them. The predicament that comes with Android arises from the fact that anybody in any place can create an app that is freely available for downloading, even though that app is not through the Google Play official app store. Even worse is that unlike the tightly-controlled Apple App Store, any app may be uploaded into Google Play without many checks, such that malware also commonly emerges on the main site.
TrendLabs has identified the principal malware threats android phone user could face:
Premium service abuser: This secretly and automatically subscribes a user to premium rate services that are owned by cybercriminals.
Click fraudster: This will force the Android phone to be generating fraudulent search engine ads clicks, which generate money which goes to the hacker.
Data stealer: It will steal and then dispatch information that is on phone, probably from the calendar or your address book back to the cybercriminals. The criminals may then decide to use this kind of data for ID fraud, or even sell the information on the black market.
Spying: This may track the GPS data of the user, or permit the hacker to be able to turn on the mic on the Android phone or camera for eavesdropping on your conversations.
Remote access rooter: A kind of tool which allows the hackers to assume total control of the device, aiming at stealing your possibly very lucrative financial data, to spy, or to force the phone into carrying out additional tasks that are unknown to the owner.
Adware: More of an annoyance than being dangerous, it will force ads which are intrusive to be appearing on the Android phone hence generating income for the ad developer.
Android Phone Security Tips
It is advisable to be wary of those free apps and only employ the Android official channels for downloading apps. Also, avoid rooting or to jailbreak the Android device. Always be alert on permissions because any app that seeks to access more than it should from your phone could mean trouble. Steer clear of unsecured and free Wi-Fi access and most important; invest in good mobile security software.
Now here’s a great video that shows you some ways to avoid any sort of malware infection.