قالب وردپرس درنا توس
Home / Mac / More malicious software for Android (iPhone and iPad Independent)

More malicious software for Android (iPhone and iPad Independent)



iPhones and iPads are easy to see in nature these days, but there are also Samsung smartphones and other Android-based devices. What I find surprising about the number of Android devices on the market is how few owners of these three problems know.

The first Google apps throw and harvest personal data (I haven't yet found a friend or family member who knows about Google rifling through their email). The other, all malicious software that floats around and grows on Android devices. And finally, the fact that most Android smartphones or tablets are rarely upgraded to get the latest security releases, while up to 90 percent of iPhone and iPad owners are upgrading to the latest versions because Apple makes it easy to upgrade to enhanced versions. [19659002] A research company that tracks malware says the latest, called Ghost Push, has 20 different variants built into Android apps and single rat devices, while infecting 600,000 users a day. Following techno news, remember the name StageFright, which infected hundreds of millions of Android devices, and is based on a security issue in Android dating back to 2008. StageFright 2.0 is lost and destructive on the Android community.

The question I have is simple.

" When you know that 99 percent of the world's mobile devices are malware on Android devices, why should you buy an Android-based smartphone or tablet? "

The answer is just as easy. Most people do not know what that means. Most have had or are using Windows PCs where malicious software is common, so malicious software on the smartphone or tablet has only part of the status quo.

Phishing attempts aside, Mac users have had many years of almost virus-free, malware-free computing, although some headlines suggest something else. The thing to remember is that a security issue in an operating system is not an exploitation matter. It also applies to the iPhone and iPad, but it is rare to find actual exploits in the wild, and those who make it to the App Store are quickly discovered and banned.

Why does anyone want to know that a product that has such poor access register for security issues and exploits?


Source link