Harmful Mobile Apps: Not to be Taken Lightly

In a series of blogs we published recently, DMS iTech highlighted certain threats Webroot has been keeping an eye on, and why they continue to be considered noteworthy as we head into 2021. In this post, we will take a look at another area Webroot has been examining, harmful mobile apps and related subjects such as Android devices and how they have had a particularly rough time with security, Joker malware (aka Bread), the Bad Binder exploit and other mobile app-related attacks with malicious intents, all so that you can be better prepared in an increasingly uncertain landscape.

Indeed, since their introduction, Android devices have had something of a rocky time with regard to security, what with several critical vulnerabilities discovered over the past decade by entities such as Webroot. In November 2019, another vulnerability was added to that list, and while organizations like Google continue to fight malicious mobile apps, the nature of their open OS unfortunately hampers these efforts.

Some Alarming Stats

According to Webroot and its 2020 Threat Report, Android malware is nowhere near as prevalent as Windows variants, but even still – it remains a genuine growing threat to the approximately 120.5 million Android users in the U.S. The following are some eye-opening facts and figures that are quite relevant:

  • To date, hundreds of malicious apps have been pulled from the Google Play Store via a review process that involves both computer algorithms and human review teams.
  • Google found Joker malware (also known as Bread) in 17,000 Android apps, which it subsequently removed from the Play Store.
  • For Webroot-protected mobile users, the infection rate was 4.6-percent in 2019; the infections fell into several categories, with Trojans and malware representing the vast majority.
  • A recurring issue with Android devices is that more than 40-percent are using an OS version older than v9, and unpatched devices are more vulnerable to malicious applications.
Malicious Apps

Why Mobile Phones are Highly Sought-After for Compromise

With seemingly everyone in the world going through life with a mobile phone attached to them at all times, it’s easy to determine why these devices are so open to compromise. Webroot has made it clear that regardless of the method of attack or intent, malicious mobile code can spell trouble for users, as the hacker can gain access to voice, text messages and email.

Beyond this, keystrokes can be monitored, cameras can be remotely accessed, the device’s location can be tracked via GPS and more.

DMS iTech: A Strong Defensive Line in a Dangerous Game

Much like a star defensive lineman in a championship football matchup strutting his prowess for the opposing team, threats such as harmful mobile apps need to be kept in check by a rival force that means business. That rival force in the fight against cybersecurity criminals is DMS iTech, as our staff boasts the experience and knowhow to take care of any harmful mobile app…and much more.

Contact us today!