Skip to main content

Red Alert : Upgrade and get rescued from Virus attack on Android Operating system

The number of malicious applications for the Android operating system has increased compared to 2010, by 472%. This is the reality that transpires from a study published by the security company, Juniper Networks, which also indicates a particularly strong rebound this November, an increase of 110% compared to October.

Moreover, Spain is the seventh country in terms of number of terminals affected by viruses and malicious code. Has the time arrived when mobile phone users should start worrying about the safety of data?


"The first thing people should understand that your smartphone is more like a computer. By making a comparison, is much closer to the computer they have at home or office that were used 4 or 5 years ago, "said Confidential Vicente Diaz, senior analyst at Kaspersky Lab malware. Indeed, in 2011 we don’t use the phone as in 2004, the year that the first known cases of virus for came these platforms.

The utilities of smart phones are infinitely greater than that of their ancestors, notably thanks to the Internet. The dark side is that we are carrying extremely sensitive data like bank account number, contact information of our social networks or images in the jacket pocket or handbag.

How does someone get a smartphone Virus? 

“Those days are gone when you used Bluetooth to transmit malicious code; right now the main route of transmission is the applications"said Diaz. The virus disguised as 'apps' are present throughout the network and have even infiltrated the official shops like Android Market. According to the independent consultant, in 2011 the pirates have cast 50 malware that have infected 250,000 users.

Not given the same circumstance in Apple Store, whose leaders maintain a much tighter control of the content. Thus, on several occasions in which analysts, journalists and hackers have tried to infiltrate malicious software on the iPhone and iPad store, it has been removed within hours.

It's not just that the signing of the block which are more attentive towards Google that also influences the admission policy: Apple checks and filters all published while Android is an open system that encourages the participation of non-professional developers. It is easy to get a developer account and Google only after a series of complaints, when there are already infected users.

Upgrades Make a Difference

However, the key to security in mobile is its software. In this section Apple and Blackberry will have a significant advantage over its competitors. Both companies believe that phones and operating system have complete control over what happens in it. They know perfectly how your machine is running your code and are ready to release an updatable given a security crisis.

In contrast, android is a compatible system created by Google to run on multiple terminals. For example, Samsung, HTC and Motorola use it for all its products because they 100% understand the interactions between software and hardware.
As a result, the responsibility of keeping the terminal is diluted between the manufacturer, the creator of the software and, ultimately, the telephone operator. Only Google can release an update. Manufacturers have to wait for these updates and then adapt them to their phones, leading to an ecosystem much slower to update, more suitable for pirates" say from Kaspersky.

What are viruses and how to know if you are infected?

Diaz warns that times have changed: "Having a infected phone is very dangerous. Before the virus was limited to send numerous SMS to a premium number for profiting, control the camera, calendar, GPS ... dominate the phone. " In the worst case scenario, a hacker could transfer money from your bank, talk to your contacts with your name, see through the camera what you are doing and always know what is your geographical location.

The worst thing is that it is not easy to diagnose an infection: "You do not notice much or anything. Terminal may run more slowly, things fail. There are times you can see a strange program running in the task manager and may even run as a normal application. Further, when the code is done well, can only be detected by an antivirus "continued Diaz.

"The malware has created enormous problems at times. Terminals have been infected workers with confidential information of companies and hackers have come to infiltrate the company network. To avoid threats is no secret formula, just take precautions: monitor applications you download, install an antivirus and, if possible, keep separate backups, "argue from the company specializes in antivirus.

Author Bio:
This Guest Post is written by Greg Salter who has keen interest in Android. He is author at Android Updater  which is a technology blog dedicated to tutorials about Rooting Android Phones  and updating them to latest Firmware’s.

Images via virusfreephone


Popular posts from this blog

BMW Ghost with 1600cc 6 Cylinder Engine with Eagle Design

Marko Petrovic has come up with an innovative design of motorcycle well inspired by wild white Eagle. Its named BMW Ghost. Name may seem quite scary but this snow colour Ghost has 1600cc 6 Cylinder Engine with amazing wild design.

 Of course top human invention Aeroplane is designed by inspiring birds.I am sure this will be our future bike design and will really make bike lovers fell as if they are flying with Eagle eyes.

For those who want to step on this Ghost and become Ghost rider should be aware that "Speed thrills but Kills".

How do you feel about this Post ? Please drop your comments and feedback.

Source : Yakodesign

Why to Use Cloud-Based Services?

Cloud computing is one of the usual suspects on every year’s “trending technology” lists for years now and we would like to add, deservedly so. Beside the fact that it is very convenient and everybody uses it, whether they know that or not, what helped cloud computing to rise to such prominence is the strong embracement from business community. No wonder, considering that clouds are making huge shifts in the business landscape and helping various companies, especially the smaller ones and startups, to overcome common obstacles in the way it would be impossible not that long ago. So, it is evident that cloud-based services are “the big thing”, let us see why.
Ease of Access

Smart devices are becoming smarter and smarter as the time goes by and we won’t have to wait for too long until they catch up with our PCs. Cloud computing allows us to utilize this extraordinary advancement to its fullest extent. Ability to access, view and edit all the important documents through cloud, wherever you…

Duality - Dual SIM, Dual Camera,Dual Flip and Dual Screen Phone

Chinavasion has displayed Duality mobile which has quite interesting features when compared to few smart phones available in market.

This phone is dual everything, two screens, two SIM slots, a two way camera, two ways to flip. As one of the best flip phones around the Duality features a cool outer casing LED display which lets you check the time and date, profile, signal and battery of the phone in the blink of an eye.

It has proved as a sexy phone with flip vertical and horizontal position feature and slick black exterior with 3 inch touch screen.The Duality mobile phone comes with everything you need to organize and manage your personal and work day-to-day activities. You have instant access to your Calendar, Notes, Email and other important areas of your task flow.

Communicate and keep connected with all your friends and family with the integrated applications like for mail and IM. Get entertainment from Mobile TV, Videos, Music and Radio. You will benefit not only from all the gre…