A government task force, the Internet Crime Complaint Center (IC3) has issued a dire warning about malware. In particular, it’s a threat to Android users. As a result, IC3 issued security tips for users as early as 2011.
There’s also a version of the OpFake malware for Android – it’s incorporated in the Opera Mini mobile browser, according to ZDNet.
Users don’t know anything’s wrong until they use the legitimate software.
Android user beware: other security applications are fakes, too – they’re Zeus malware. Known as “Android Security Suite Premium,” they confiscate new SMS messages to the Android user.
Messages can include passwords and other sensitive data, according to Kapersky Lab Security News Service.
Countless headlines detail the cyber dangers of Android-based devices, which is why it was announced that 22 applications were taken off the market by Google.
The operating system’s issues stemmed from malware infections.
So who can benefit? Certainly it isn’t Android users.
“We continue to advise readers to be very cautious in downloading Android applications,” wrote Stan Stahl, Ph.D., on his blog. “Applications should be downloaded only from ‘official’ stores and only after they have been ‘vetted’ as legit,” wrote the nationally known security expert.
Google removed the apps from its Android market after they fooled users into accepting hidden, fraudulent charges.
“Applications should be downloaded only from ‘official’ stores and only after they have been ‘vetted’ as legit.”
The biggest operating-system competitor to Google’s Android: Apple’s iOS.
Published reports indicate Microsoft is actively pursuing opportunities to capitalize on Android’s woes.
Blackberry, of course, has problems with profitability. New products have been slow to market. As Blackberry’s phones age and need to be replaced by business users, Apple’s products might become even more attractive in the corporate world.
And if the vulnerabilities aren’t resolved, both Apple and Microsoft should be in a position to profit.
From the Coach’s Corner, security resource links:
BYOD, Mobile-Banking Warnings about Security Prove Prophetic — Not to be gauche, but in 2009 you saw the Internet security warning here first – mobile banking is so risky an IT security guru said don’t do it. The warning was prophetic.
New Cybercrime Serves as Warning to Take Defensive Precautions — Cybercrime is only getting worse. From both sides of the Atlantic Ocean, here are three examples of countless crimes: Authorities including the Secret Service are investigating the hacking of retailer Target in 2013 – hackers stole credit and debit card data from 40 million customers.
Identity Fraud Escalates in Smartphones, Social Media — Skyrocketing mobile malware threats amid widespread use of BYOD, bring your own devices, will lead to a $1.88 billion services market in 2013. That’s according to ABI Research. Cybercriminals are successfully attacking vulnerabilities in individual devices and networks to an ABI report.
Tips to Prevent Hacking of Your Bluetooth — Bluetooth technology, of course, allows you freedom when talking on your cell phone. But you’ll lose other freedoms if you don’t prevent scammers from exploiting your system via a trend called “bluebugging.” Beware, cybercriminals using software, are able to intercept your Bluetooth signal to hack into your phone.
Why Many Healthcare Workers Are Alarmingly Responsible for Medical ID Theft — Medical identity theft is skyrocketing. It’s the fast-growing trend in ID thievery. Health-care providers apparently can’t trust their employees to use best practices in observing The Health Insurance Portability and Accountability Act (HIPAA), which has been in effect since 1996. You hear the acronym a lot in healthcare.
“Distrust and caution are the parents of security.”
Author Terry Corbell has written innumerable online business-enhancement articles, and is a business-performance consultant and profit professional. Click here to see his management services. For a complimentary chat about your business situation or to schedule him as a speaker, consultant or author, please contact Terry.
Photo Courtesy AdamR at www.freedigitalphotos.net