SHARE
Facebook X Pinterest WhatsApp

Android: Top Three Malware Threats and Solutions

Sep 25, 2013

Android Threats and Solutions

1-Malware Threats to Mobile Operating Systems in 2012Malware Threats to Mobile Operating Systems in 2012

Android: 79%, Symbian: 19%, iOS: 0.7%, Others: 0.7%, Windows Mobile: 0.3%, BlackBerry: 0.3%

2-Types of Security ThreatsTypes of Security Threats

The report outlined security threats and mitigation strategies for the following: SMS (Short Message Service or text message) Trojan horses, rootkits, and fake Google Play domains

3-SMS Trojan HorsesSMS Trojan Horses

Almost half of the attacks on older Android OSes are done by SMS Trojans. Without the user’s knowledge, the Trojans send text messages to premium-rate numbers that are owned by cyber-criminals. These texts result in exorbitant charges to the user.

4-What To DoWhat To Do

Install an Android security suite designed to combat SMS threats. Suites can be purchased or downloaded free from the Internet.

5-RootkitsRootkits

In late 2011, a rootkit was discovered running on millions of mobile devices. It logged users’ locations, keystrokes, and passwords without their knowledge.

6-What To DoWhat To Do

Install the Carrier IQ test, a free application that detects and removes the malicious software.

7-Fake Google Play DomainsFake Google Play Domains

Google Play enables users to browse and download entertainment and media including music, books, magazines, movies and TV programs. Fake Google Play Domains are sites that cyber-criminals create to trick users into installing malicious applications so that they can steal sensitive information.

8-What To DoWhat To Do

Install only approved applications. Follow IT department procedures to update devices’ OSs. Users should install and regularly update Android antivirus software.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.