Popular Posts

Apr 7, 2012

The latest Android malware can remotely control the user's mobile phone

April 7 news, according to foreign media reports, security researchers found a date for the Android operating system, malicious software, hackers can remote control the user's mobile phone through the software installed on their cell phones and users without the knowledge ofunlicensed software.




Tim Wyatt (Tim Wyatt), a chief engineer and mobile security experts said in a blog published by the Lookout site, the malware is a variant of earlier known malicious software the Legacy Native (also known as LeNa). And explain Road LeNa only affected a very wide sphere of influence is not, "Lena will initially emerge a legitimate application, in an attempt to deceive the user through the user access to superuser privileges to use certain applications start the SU application activate its malicious payload. "Wyatt added that only a skilled user will encounter this risk.

The latest malicious software application of a program called the 'Gingerbreak', Gingerbreak allows the malicious software in the user unaware of the case is rooted in the run the Android Gingerbread and the Android operating system devices in the Honeycomb.

Fortunately, the malware has not yet appeared in the Android Market. However, Wyatt Bowen said the malware has started to spread to other systems on the cell phones market. In addition, it also summed up the following suggestions to enable users to stay away from the Android malware:

An abnormal condition that occurs when to alert the use of cell phones, such as phone bills, some baffling fees, non-normal SMS and network activity, or in the case of the phone lock screen application activities.

Regular checks of the application requests permission, permission requirements ensure that a program and its features to match.

The only security source site to download the application, such as the famous App Store and download site.

Safety procedures to install a mobile application is downloaded to the scan cell phone security.

No comments:

Post a Comment