Top Banner
Security Risks with Fake Apps Quick Heal Technologies Private Limited
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security risks with fake apps

Security Risks with Fake Apps

Quick Heal Technologies Private Limited

Page 2: Security risks with fake apps

Agenda For the Webinar

Google Play history

Apps & Permissions

The Threat Landscape

How does the threat spread

How are the users affected

What can users do to prevent threats?

What are the best practices

How can Quick Heal help

Page 3: Security risks with fake apps

Google Play - History

Google Play was launched on March 6, 2012, with the merger of Android Market, Google Music, and Google eBookstore, marking a shift in Google's digital distribution strategy.

As of early 2015 the Google Play store has more than 15,00,000 apps live and has crossed more than 50,000,000,000 app downloads

Source - https://en.wikipedia.org/wiki/Google_Play

Page 4: Security risks with fake apps
Page 5: Security risks with fake apps

Permissions asked by Apps

Possible app permissions include functionality like:

• Accessing the Internet

• Making phone calls

• Sending SMS messages

• Reading from and writing to the installed memory card

• Accessing a user's address book data

Page 6: Security risks with fake apps

The Threat landscape

Page 7: Security risks with fake apps

You are not safe

Page 8: Security risks with fake apps

How does the Threat spread?

Some reported incidents wherein malware came disguised as Android apps.

• Android.FakePlayer.A

• Android.Tapsnake.A

• Android.Geimini.A

• Android.Adrd.A

• Android.Rooter.K

• Android.FakeRun.A

• Android.Fakedefender.A

Page 9: Security risks with fake apps

How are the users affected?

I. Unauthorised Text Messages

II. Information Theft

III. Disclose Location Info

IV. Mobile Botnet

V. Rooted devices

VI. Compromised security

Page 10: Security risks with fake apps

What can users do to prevent threats?

• User vigilance remains key to prevent the threats from infecting users’ mobile devices.

• Before installing an app, double check what resources it seeks access rights to.

• Trojanized apps usually ask permission to access information that may not even be related to what these are.

• The cybercriminals behind mobile device attacks rely on the fact that users do not fully read through end-user license agreements (EULAs) before accepting them.

Page 11: Security risks with fake apps

What are best practices

• Update your mobile devices

• Guard your personal information

• Think before you app

• Update Your Mobile Device

• Protect your money

• When in doubt, don't respond

• Stay informed

Page 12: Security risks with fake apps

How can Quick Heal help

Scan Device

Optimize Device

Secure data

Set Privacy

Background Scan

Activity Monitor

Anti-theft Security Shield Automated Virus updates Trusted Sim List Remote Device Management Intruder Detection Quick settings notification

Page 13: Security risks with fake apps

Write to us at: [email protected] Follow us on: Facebook - www.facebook.com/quickhealav Twitter - www.twitter.com/quickheal G+ - bit.ly/QuickHealGooglePlus YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Visit us: Website - www.quickheal.com Official Blog - blogs.quickheal.com

Page 14: Security risks with fake apps

Thank You!