In light of a new Android Trojan dubbed “Not Compatible” spreading through compromised Websites, it was high time a guide was provided on how users can boost their security against hacking that takes place through spyware and malware. Although the threat of the Trojan
seems to be minimal at this point, security provider Lookout says this
is the first time hacked Websites are being used to target mobile
devices. Android spyware is not a new problem for android users, neither is the mobile spy aspect of their existence.
Further, Lookout believes the new malware could be used to break into private networks via an infected Android device.
The Trojan works by automatically
downloading an application from a compromised site through the Web
browser, a process known as a drive-by download. The mobile device then
prompts the user to install the downloaded app. But for the app to
actually install, the unknown sources setting must be enabled on the
device; otherwise the installation is blocked. It’s a dangerous form of android spyware that needs to be tackled immediately.
So how does one prevent the online
invasion of Spyware and Malware. These spyware and malware programs
often change browser settings, alter system files and create new default
Web pages. Typically, infected systems are plagued with new tool bars
and a constant barrage of popup ads. Scores of useless and annoying Web
sites can be added to your “favorites” folders without you having selected them!
Typically, malware will also collect personal information from users systems regarding their Web activities,
transferring it to advertising and data-research companies. These
companies determine the Websites that users frequent and employ the
information to tailor the ads they send to individual users. Several
malware programs even regularly update their own program codes on
infected computers.
Popup and pop under ads are another great nuisance originated by malware, but perhaps most importantly, malware
cases computers and phones to perform poorly. Frequently infected
machines freeze up often and at times crash. And those trying to spy on a
phone can use this version of a mobile spy to get their things done.
The most common way for malware to work
its way into a phone or computer is to piggyback on a free program that
is downloaded on the Internet. Most users click I agree or I accept
without reading the long and complex agreement that expresses consent to
place the malware onto their machines.
These days most users have been warned about not clicking into unknown attachments or accepting downloaded programs. Unfortunately, at this point a wrong click is not all you have to be worried about. Many sophisticated malware programs
are now employing the so-called drive-by downloads, All you have to do
is visit a popular and presumably safe Website, where malware can
automatically latch onto your system. Hackers can also find their way into a user’s computer or phone via spyware and malware,
wherein the infecting malware allows for the breaking down of security
systems and provide access for hackers to various infected devices.
High-speed Internet users are also at great risk for spyware due to the lack of consumer usage of built-in firewalls, the speed at which spyware files can download and because of the always on nature of broadband and 3G and 4G networks. Once downloaded onto a computer or phone, spyware can be difficult to find, uninstall or disable.
So what protections against malware are available? Certainly, the best time to address malware and spyware
is before they find their way onto the respective devices. Several
emerging technologies and service providers as well as applications
assist users with
- analyzing network traffic patterns
- monitor the device systems and practices
- assess risk exposure
- recommend remedial measures
Many anti-malware and anti-spyware
products and apps exist, some better than others, and some more
expensive than others. There are also excellent free programs. It is
important to remember the importance of updating anti-malware and antivirus
programs. New malware is designed every day, and whenever a new
defensive product or revision hits the market, it is only a matter of
time before the malware designers find creative ways to circumvent the
software. This continuous game requires users to constantly update their
protective softwares.
How to Prevent Virus Infection and Eventual Hacking ?
Be careful with the spam you receive;
users should not buy anything promoted in a spam message or reply to
spam or click on its unsubscribe link. If a users e-mail program has a
preview pane, disable it to prevent the spam from reporting back to its
sender.
Users should use one e-mail address for family and friends,
another for everyone else. When an address attracts too much spam,
abandon it for a new one. Users should also select an address with
embedded digits. Also, if a user is getting lot of spam, they should
check their Internet service provider’s filtering feature and compare
them with those of competitors.
Users should use anti-virus software and heed security alerts e-mailed directly from anti-virus vendors to download antidotes for newly circulating viruses and worms.
Be it a computer or cellphone, users should regularly update their operating systems, Web browser and other major software.
Users should only download and install
software and applications from trusted sources. They should also close
windows containing pop-up ads or unexpected warnings by closing the
entire window, not clicking or tapping on anything within the window.
Author Bio
Jane Andrew is the author of mobile spy and android spyware technology. She provides tips, tricks and news about mobile phone apps. You can also follow her on Twitter @ janeandrew01 to get the latest tips about mobile security.
0 comments:
Post a Comment