Smartphones are now fairly popular, and mobile apps are bringing convenience to users and also pose a security risk. CCTV also gave a great deal of attention, yesterday, the National Network of Information Security Institute released the second quarter of 2013 China Internet, Chinese mobile internet application Security detection and Analysis report, published the top ten malicious mobile phone application rankings. In the top ten malware rankings, the top one is called "Flashlight" application.
At present, China's software application platform to Google's Android mainly occupy the domestic mobile application of 86.4%, so the report is aimed at users of the most used Android platform software, especially the unofficial application store.
According to the report, the current Android platform used most of the malicious applications mainly have flashlights, 3D dream aquarium 2.99/2.94, crocodile love to bathe, its download amount to 2 million times. One-key root, need for speed thermal tracking dynamic download more than 1 million times. In addition, Sky save money Telephone, Hero Alliance control 7.8.3/7.5.3, Swiss Army Knife and other software also list, its download quantity also reaches 50.86 million times.
In the Android unofficial App Store, malware is more than 10%, a user who downloads 9 apps, and one is malware. In addition, there are 60% of applications suspicious behavior, these applications like a time bomb, although not active attack mobile phone, in fact, there is also a danger, because it can get the user device ID, specific location information, or even automatically connect the network, turn on Bluetooth.
As China has not yet issued a code for mobile application store security requirements, resulting in some of the application store security threshold is low, a large number of malicious applications can easily be stationed in the application store to provide downloads. Experts suggest that our users should cultivate a good habit of using smart phones safely, as long as careful, malicious software is not difficult to prevent. Before using the software, be sure to read the relevant permission request.