Skip to main content

more than 2000 apps over playstore are dangerous !


Over 2,000 dangerous apps on Google Play Store !


                    A study carried away for 2 years ,has found that 2,040 apps on Google Play Store are harmful in some way. The study done by some researches of the University of Sydney and Data61 of CSIRO says the research applied on about 1 million apps

Study finds over 2,000 dangerous apps on Google Play Store.
The most common issue being that these apps require suspicious amount of permissions. But, some of the apps have been straight up called as malware(malware is a kind of software designed to cause damage to computer,server or network in the form of execuatable code,scripts or software ). The report highlights Google’s failure to guard Play Store from fraudulent developers.


The study finds that there are a large amount of fake apps on Play Store that are not malware. It adds that these apps require unnecessary permissions to access data that they don’t need in the first place. Some of the popular titles asking for such permissions include Temple Run and Hill Climb Racing.

How researchers identified harmful apps on Google Play Store?
The researchers used an algorithm ,that coded to look for similar text description. The algorithms also looked for visually similar icons to identify fake apps on the Play Store. They set visually similar icons to 10,000 most popular apps on Google‘s app store. The algorithm reportedly returned 49,608 potential threats based on the algorithm.


 Google removed 28 fake apps from Play Store after a report by Quick Heal.
About 7,246 of the apps found on Play Store were flagged as malicious by VirusTotal. The app flagged 2,040 of them as fake and high-risk apps. In total, 1,565 apps were found requesting at least five sensitive permissions. On the other, there are 1,407 apps that embed third-party ad libraries,otherwise called adware, that injects ads into apps in unauthorized manner .
Google says the apps studied by the researchers have already been removed. Increasingly, Google is taking action against such fraudulent apps based on research and studies around the world.

Comments

Popular posts from this blog

stock market trading technical analysis(#identify trend)

STOCK MARKET TECHNICAL ANALYSIS (IDENTIFY TREND) TECHNICAL ANALYSIS IS VERY IMPORTANT ANALYSIS FORM FOR TRADING ANY SEGMENT OF OF STOCK MARKET OR CURRENCY MARKET OR FUTURES AND OPTIONS. The first step of technical analysis is to identify the trend. Because  even if you are very good at technical analysis ,butyou dont know how to identify trend ,then most likely the trade may go against your prediction most of the time. Because as a famous saying in trading world , "Trend is your friend".                Once a stock ,or currency is in trend , then it may continue in that trend for quite sometime.It's not like it just going to end abruptly. Most wise thing is to trade according to the trend.that way you go with the flow , instead of fighting with the market. There are instances, where fighting with the market doesn't go well for trader .               Being a retail trader ,we already in a weak spo...

html introduction(#html tutorial)

Things to know about SIM swap fraud?

How to be safe from SIM swap fraud? Tips ! SIM swap fraud is a  sophisticated form of cyber fraud that allows hackers to gain access to bank accounts, credit card numbers, and other personal data. The SIM swap cases were reported in the US and Europe in 2013 and now it's in trend in India. Many people have lost their valuable money due to sim swapping fraud . Many cases are reported in media about people losing money to sim swap fraudsters.Best way to avoid such incidents is to educate yourself and be aware. check book on "Prevention of Cyber Crime and Fraud Management" What is a SIM swap fraud? Nowadays, all the bank accounts linked to your mobile numbers and most of the banking services are available on the mobile phone. For online transactions, one needs One Time Password (OTP), Unique registration number (URN), 3D secure code etc. which is all provided through the registered phone number of users. Fraudsters acquire your personal details by tr...