Update: http://www.xinhuanet.com/english/
2013-10-28 07:31:06
Mobile Trojan "Android Updates" disguised as system updates, tips induce the user to install, and then steal the user call log, contacts, phone firmware information, and in the background secretly downloaded dozens of malicious applications consume hundreds of megabytes user traffic to the user with to direct property loss.
Xinhua Tianjin, October 27 (Reporter Zhou Runjian) With the rapid proliferation of Android smartphones, mobile Trojans and malicious adware are also increasingly breed. 360 mobile guards monitoring found a camouflage "Android updated" Trojan becomes the current mobile phone "Blow", has infected nearly 500,000 Android phones.
According to the mobile security expert Zhang Xu introduced, mobile Trojans "Android Updates" disguised as system updates, tips induce the user to install, and then steal the user call log, contacts, phone firmware information, and in the background secretly downloaded dozens of malicious applications, user-consuming hundreds of megabytes of traffic, giving users direct property loss.
"Because many mobile phone users find after the loss to the security vendor calls for help, download security software killing Trojans, Trojan large number of infections caused the nearly 500,000 mobile phones." Zhang Xu said.
It is understood that Trojan disguised as through normal application of the system software or tampered with to achieve the purpose of inducing the user to install, including the "Android updates", including a lot of Trojans, they focused on the behavior of the major hazards to "steal calls" and "steal Privacy" two point.
Zhang Xu said that the current Android Trojan lower technical threshold, the rapid expansion of the number of new mobile Trojans, users should pay special attention to prevention, through regular and reliable way to download the application, rather than random search or downloaded from the Forum unfamiliar users to share applications.
For smart phone users, equally worthy of attention is the cottage or something brush preset channel applications. According to the 360 mobile guards for 1500 sampling and analysis of the balance presets applied statistics, an average of 80% of the pre-application for permission to excessive behavior, that these applications applied to the mobile operating system with its own functions to achieve unrelated system privileges. These "ultra vires" behavior on the user's privacy posing a great threat.
Feng Ting
This article Source: Xinhua http://www.xinhuanet.com/english/
2013-10-28 07:31:06
Mobile Trojan "Android Updates" disguised as system updates, tips induce the user to install, and then steal the user call log, contacts, phone firmware information, and in the background secretly downloaded dozens of malicious applications consume hundreds of megabytes user traffic to the user with to direct property loss.
Xinhua Tianjin, October 27 (Reporter Zhou Runjian) With the rapid proliferation of Android smartphones, mobile Trojans and malicious adware are also increasingly breed. 360 mobile guards monitoring found a camouflage "Android updated" Trojan becomes the current mobile phone "Blow", has infected nearly 500,000 Android phones.
According to the mobile security expert Zhang Xu introduced, mobile Trojans "Android Updates" disguised as system updates, tips induce the user to install, and then steal the user call log, contacts, phone firmware information, and in the background secretly downloaded dozens of malicious applications, user-consuming hundreds of megabytes of traffic, giving users direct property loss.
"Because many mobile phone users find after the loss to the security vendor calls for help, download security software killing Trojans, Trojan large number of infections caused the nearly 500,000 mobile phones." Zhang Xu said.
It is understood that Trojan disguised as through normal application of the system software or tampered with to achieve the purpose of inducing the user to install, including the "Android updates", including a lot of Trojans, they focused on the behavior of the major hazards to "steal calls" and "steal Privacy" two point.
Zhang Xu said that the current Android Trojan lower technical threshold, the rapid expansion of the number of new mobile Trojans, users should pay special attention to prevention, through regular and reliable way to download the application, rather than random search or downloaded from the Forum unfamiliar users to share applications.
For smart phone users, equally worthy of attention is the cottage or something brush preset channel applications. According to the 360 mobile guards for 1500 sampling and analysis of the balance presets applied statistics, an average of 80% of the pre-application for permission to excessive behavior, that these applications applied to the mobile operating system with its own functions to achieve unrelated system privileges. These "ultra vires" behavior on the user's privacy posing a great threat.
Feng Ting
This article Source: Xinhua http://www.xinhuanet.com/english/