Find a Question:
Security report: most gaming applications for malicious software lamb
Security report pointed out that the gaming applications are most commonly used by pirates for distributing malware to smart devices which helps them to penetrate those devices.
The company confirmed “McAfee” for the security and protection of data that hackers exploit the popularity of gaming applications, specifically free them in order to spread malware loaded applications and entice users to install on their computers.
The company added security in the latest security report her about the security of mobile devices that those applications often believe the pirates get on the powers of major organs of the victims, especially as there are a number of users agree to grant all powers required by the application when you install it without thinking about the seriousness of the granting of such powers.
He said, “Stefan Brchard,” Deputy Head of Unit “consumption and mobile devices” in the “McAfee” Asia Commenting on these users “They open the door with their hands for hackers to enter and access to their personal information and important.”
May allow some powers to the owners of the applications access to the phone records and obtain a copy of the information recorded it, and allow some powers to use the camera to take photos and record videos remotely addition to using Sound Recorder to record audio clips to the user.
To this, the report noted, “McAfee” to the spread of applications facilitates deception via SMS, pointing out that 26% of the applications currently available may contain malicious software facilitates access to personal information useful to trick the user operations.
The size of the applications that are expected to be installed on smart devices by the end of the current year amounts to about 80 million application, according to a study to Juniper Research, which confirms to the increasing volume of security risks related to special applications with high prevalence of smart devices in the hands of users around the world.
Security and protection ,
Malicious software ,
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!