• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Manogna Alahari

RottenSys: Some smartphones are coming with malware already installed

September 17, 2018 by Manogna Alahari 4 Comments

The team of security researchers discovered there are millions Android brand new smartphone have been pre-installed malware, call “RottenSys”, somewhere along the supply chain. This looks like Android systems are more vulnerable to malware and other attacks. Android systems should consider running a pre-installation security check to be part of their OS, This will help detect any malware or unwanted software to be part of their Operating System. Also, comparative studies with other OS like MAC OS will help them understand why Android ‘s are more vulnerable to insecure software.

Because of the way Google Play works, Android has a “bad app” problem. Google lets any developer upload an app to the Play Store, regardless of if it works, how it looks, or whether or not it can harm users. Malware scanning happens primarily after apps are uploaded, and though Google has recently taken steps to safeguard users with its Play Protect program, you don’t have to depend on them.

Below are the few tips to prevent malware attacks in Android systems :

Tip 1: Don’t Depend on Google Play Protect

“Google Bouncer” will help identify malware in the apps within the play store

Tip 2: Review App Permissions

By minimizing app access, protect yourself from hackers obtaining an unnecessary amount of information about you. This practice also protects you from malicious agents (such as hackers) who might compromise the app to attack your device.

Tip 3: switch Off Unknown Sources

disabling “Unknown sources” won’t deactivate the third-party apps. Instead, it will prevent unauthorized installation of non-Play Store apps from outside threats scheming to attack your device.

https://blog.avira.com/rottensys-preinstalled-malware/

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in