contador javascript Skip to content
Contact :

IC3 warns about viruses that attack Android devices


IC3 warns about viruses that attack Android devices

Written by

October 16, 2012

Malware, Android virus

The US agency IC3, the Internet Crime Complaint Center, of which the FBI is a member has made a report in which it gives notice of the circulation of malware which attacks Android mobile devices circulating on the Internet. The notice was published on Friday and we echo it. It seems that the most notable viruses are known as Loozfon and FinFisher.

Malware, Android virusLoozfon steals information of your device while FinFisher is a spyware or spyware that allows monitoring and take control of your device remotely. Both arrive on your device through links in e-mails or text messages, in the case of phones.

In U.S.A. they have only attacked Android but in Japan have managed to reach iOS, Blackberry, Windows Mobile and Symbian. So they have the ability to reach any device.

In August, the famous antivirus company Kapersky warned that in the second quarter of 2012 they had identified a large number of viruses, about 15,000, that sought to infect Android devices. Half of those viruses were multifunctional Trojans that sought to steal contact information, especially phone numbers, so smartphones were the main threats. The McAfee company in turn recently pointed out that the pace of creation of these programs is getting faster.

In fact, Google?s new operating system, Android 4.1 Jelly Bean, brought many safety improvements because of this growing risk of infection.

IC3 gives a few precautions to protect our phone or tablet and Do not reach a paranoid state like many American users have arrived who no longer install new applications.

First, turn off the elements of our device that are not in use to minimize the damage of an attack. A task manager It would be ideal for this.

Second, use encryption, passwords to the device and applications Allow it.

Third, find information about applications and games before installing them. It is important to find a review or comment from another user that you trust.

Quarter, read the permissions well that we give to applications before installing them.