Hacked smartphone apps
Hacked smartphone apps? On the internet, as in all life, total security does not exist. Threats lurk in every corner, and, to avoid them. It is important that the user pay attention to the details before interacting with any mail, page or file that is minimally suspicious. And, precisely, the same happens with mobile applications, which are tools that can help the user; but they should not be downloaded, in any case, lightly.
When downloading an “app” it is very important to follow a series of steps that are decisive to avoid a scare. Explains the technical director of the cybersecurity company Check Point to ABC. Here are a few tips that can help you keep your data safe.
Mobile Counterfeit Apps
One of the most common techniques used by cybercriminals who work with applications is to fake popular “apps” to get more downloads . The study “A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps”, prepared by the University of Sydney and published last year. During two years, the presence of more than 2,000 applications for Android present in the official Google Play store posing as other known “apps” and containing “malware“, that is, viruses.
That is why it is crucial to pay close attention to the fact that the application we want to download is the original one. This can be seen by checking the number of downloads, the reviews of other users or the syntax in the description.
Malicious apps in google play
When downloading an application it is essential to always use the official stores of the devices. These are the Google Play Store and the Apple Store , in the case of Android and iOS respectively. On the internet, there are countless web pages that offer the download of “apps” for mobile phones that are not available on official sites. The fact that their origin is unknown, and that, in principle, brands do not trust them to offer them, is a clear indicator that they could be malicious.
The technical director of Check Point places a lot of emphasis on this detail, although he acknowledges that in Google Play. In the Apple Store you can also find harmful applications for devices. You should always use official stores. Inside, the probability of finding a malicious “app” is lower. Although it exists. Companies have services that are dedicated to discarding applications that appear to have some kind of hidden “malware,” but they don’t always work. “
Be Careful With The Permits
Before installing any service on a device, it is important to review, even for just a moment, the information that it requests from the user. In accordance with this, it is normal for an application like Instagram, designed especially for sharing photos and videos. It should ask the user for permission to access the microphone, the camera and the “smartphone” roll. However, for example, we download an app with flashlight functions. It asks us for access to all the information that we store on the device. It does not need it to function correctly. The most convenient thing is to save the download so it can happen.
Update apps, as in the case of operating systems, are crucial to strengthen the security of the terminal. And it is that, normally, the new versions are accompanied by solutions of open gaps that can be exploited by cybercriminals. For this reason, cybersecurity experts recommend not letting time pass and carrying out the corresponding update as soon as it is available.
How do i uninstall hidden apps
You may not find hidden apps on the home screen or app inventory. It is very easy to find the hidden apps. Goto settings. Select apps. Here you will find the list of all apps which are hidden. You can uninstall all the apps which are not required.