google slide قوقل: تحميل التطبيقات من خارج قوقل بلاي يشكل خطراً على أجهزة المستخدمين
Occur , " Adrian Ludwig ," manager protection in Android at a conference VirusBulletin 2013 , which was 
held in the city of Berlin, the German current situation to the Android system with malware in general, especially since the latter became raises a lot of questions as a result of security attacks developed that became exposed , which has increased concern to users.
He says, " Ludwig " on the face of all these problems for users of Android, translated Google through the development of systems of protection "Bouncer" and "CDC", so that they can monitor the malware in the App Store and control , as well as the percentage of the passage of malware and success in bypass protection systems currently do not exceed 0.001 percent only.
The spokesman stressed during the conference on the issue that the establishment of Android users download applications from outside the stores with official may pose a significant threat to their devices , and this during his presentation to the figures that illustrate the extent to which those applications malware in general , as it is in a sample of 1 million application was installed outside a shop Google Play ( Google Play ) , was discovered the following:
About 1,200 of those applications were classified as malicious software .
15 percent of those applications that have been installed , are motivated spyware and commercial profitability .
40 percent of those applications can use powers " Alroot " in users ' computers .
40 percent of those applications also can access the call log, or messages without prior knowledge of users.
5 percent of the remaining applications are malicious software wildly different.

image 2 app installs histogram قوقل: تحميل التطبيقات من خارج قوقل بلاي يشكل خطراً على أجهزة المستخدمين



Indicates "Ludwig" in the latter to the need for users' attention to the source of their applications that are downloaded, in addition to the need for orientation to adopt precautionary steps as to avoid the possibility of targeting and exposure to electronic attacks.

0 comments :

Post a Comment