Box Layout

HTML Layout
Backgroud Images
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
Backgroud Pattern
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
  • greenforest
Google Play Store, the main source of malware?

Google Play Store, the main source of malware?

InicioSeguridadGoogle Play Store, ¿la principal fuente de Malware?
Por
Redacción Byte TI
-
0

We tend to think that Google's play store is a safe space to download and install our apps, and in broad strokes it is so.Google has an app protocol that distributes in its own market, to ensure that they have the appropriate conditions to be distributed online and guarantee the full safety of user devices.

However, a recent Nortonlifelock study argues that up to 67% of the malware that affects Android devices comes from apps installed from Google's own play store.Many of them are usually complementary apps that take advantage of the most popular apps pull.Kaspersky Labs was able to locate up to two0 malicious app around the Minecraft that had managed to pass the Google Play Store filter.

It is a worrying statistic that invites us to look for alternatives to Google to guarantee the safety of our devices, especially when using the little ones in the house, which usually fall more easily victims of scams and malicious software on the Internet.These are some of the measures you can adopt to protect your device.

1.Install anti-malware software

Although viruses are not too problematic on smartphones, having an antivirus or confidence antimalware software on your phone can facilitate the detection and elimination of malicious apps.This is especially useful when blocking apps that seem to overcome Google controls, and that appear to be ‘legitimate’ from the play store.

When installing anti-malware software, avoid generic software and try to bet on recognized companies, to make sure they work properly.

two.Use a VPN

A VPN is one of the essential cybersecurity tools when protecting the data you send or receives from your devices.This is especially important if you buy with your smartphone, you access your online bank, or you have your email linked.A VPN safely encrypts all the data you send or receive from your devices, to guarantee that only you and your recipients can access them.

If you are not familiar with the operation of the VPNS, you can install a free VPN and try it for 30 days to check all its advantages.In addition, a VPN will also help you protect other equipment, such as laptops or tablets.

3.Distrust of apps that request excessive permits

Some apps request an amount of permits that do not seem logical considering the function they have.Why would you need a flashlight app accessing your personal photos and make calls?Why does a calendar need access your front camera?If an app requests excessive permits, unleash it immediately to avoid major evils.Keep in mind that some of these abusive apps can be very popular: Facebook or Instagram are applications that monitor practically everything that happens in your smartphone so it may be better to uninstall them and opt for safer social networks like Twitter.

4.Use robust and unique passwords

Google Play Store, ¿la principal fuente de Malware?

On average, each person has about one hundred accounts on different Internet platforms.It is a very high figure of usernames and passwords that can tempt us to reuse some of our keys or to choose relatively easy to remember passwords (and guess).This is a serious error.A single filtration in one of these platforms could then enable a hacker access to a lot of our accounts, including our online banking or our personal email.

To avoid this, always use unique robust passwords for each platform.You can help you a password manager if necessary.

5.Make your smartphone just yours

It is not a good idea to share the use of your smartphone with other people, even if they are people who trust, and no matter how much they have the slightest intention of causing damage to your device.Most of the malware that we download on our smartphones do it by accident, so be sure to minimize risks and be you the only person who manages your phone.Adopt the necessary protection measures, pay attention to suspicious apps, and everything should go well.

Share
Facebook
Twitter
Linkedin
WhatsApp
Email
ReddIt
Telegram
    Artículo anteriorEl Smart Working: palanca de transformación en la gestión de RRHH
    Artículo siguienteEstos son los beneficios de la digitalización en Europa
    Redacción Byte TI

    Artículo relacionadosMás del autor

    Actualidad TI

    The fissos consider the key socate in their strategy

    Vídeos

    Videos: What is a rootkit?

    Actualidad TI

    How to improve the safety of domestic routers?

    Actualidad TI

    Don't you get the accounts in the cloud?

    Contenido Destacado

    Why is immutable data storage critical in the security strategy?

    Seguridad

    Cybersecurity: the importance of caring for it and also telling it

    Dejar respuesta Cancelar respuesta

    Enter to leave a comment

    Whitepapers

    Drives the business value of your applications

    WhitepapersRedacción Byte TI -
    En las empresas de todos los tamaños y sectores, la capacidad de responder a las condiciones cambiantes del mercado y a las expectativas de...

    The way to intelligent and automated infrastructure

    WhitepapersRedacción Byte TI -
    Hoy en día, las empresas de todos los sectores necesitan una sólida estrategia de visibilidad y monitorización para ofrecer experiencias digitales impecables de forma...

    The perfect solution for a virtual desktop

    WhitepapersRedacción Byte TI -
    HPE Greenlake Y VMware, la solución perfecta para un Escritorio VirtualDescargar whitepaperLa digitalización de los procesos de trabajo en todo tipo de empresas trae...

    Contenido destacado

    The new reality of printing processes

    Contenido DestacadoRedacción Byte TI -
    Es un hecho que en septiembre y octubre de two0two1 hubo una vuelta masiva a las oficinas en España, aunque esta no ha sido...

    Metaverso: Fiction made reality

    Contenido DestacadoRedacción Byte TI -
    Las icónicas hermanas Wachowsky, en el año 1999, plasmaron en un largometraje bien conocido por todos una idea que parecía no tener cabida en...

    Why is immutable data storage critical in the security strategy?

    Contenido DestacadoVanesa García -
    Según una reciente encuesta realizada por Dimensional Research, el 96% de los responsables TI reconocen su preocupación por los ataques de ransomware, y de...

    • Tags:
    • For a free PDF smart cosmetic

    Related Articles

    Cher is 75 years old and still looks like she's 25

    For decades, Cher's appearance has been a mystery to everyone. The famous actress and singer seems to have achieved the formula of eternal youth, since she is 75 years old and looks less than ...

    Allisson Lozz shows off her pregnancy belly and excites her followers

    Celebrities Many thought that Allisson Lozz was pregnant again, but the image published was from her first pregnancy. The former actress does not usually publish photos of her past professional life, but ce ...

    Dermocosmetics: the importance of innovation and technology for skin care - El Mostrador

    Last week, Coréana was launched in Chile, one of the leading laboratories in cosmetics in Korea and which, little by little, has been expanding to other countries, where it has had...

    49 Best Creams in Massage and relaxation in 2021: according to the experts

    You can get any random Massage & Relaxation Creams, but if you are looking for expert advice to make the best choice for your needs, then you have come to the right place. No matter...