{"id":5532,"date":"2018-09-17T14:06:51","date_gmt":"2018-09-17T18:06:51","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5532"},"modified":"2018-09-17T14:06:51","modified_gmt":"2018-09-17T18:06:51","slug":"rottensys-some-smartphones-are-coming-with-malware-already-installed","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/09\/17\/rottensys-some-smartphones-are-coming-with-malware-already-installed\/","title":{"rendered":"RottenSys: Some smartphones are coming with malware already installed"},"content":{"rendered":"<p>The team of security researchers discovered there are millions Android brand new smartphone have been pre-installed malware, call \u201cRottenSys\u201d, somewhere along the supply chain. This looks like Android systems are more vulnerable to malware and other attacks. Android systems should consider running a pre-installation security check to be part of their OS, This will help detect any malware or unwanted software to be part of their Operating System. Also, comparative studies with other OS like MAC OS will help them understand why Android \u2018s are more vulnerable to insecure software.<\/p>\n<p>Because of the way Google Play works, Android has a \u201cbad app\u201d problem. Google lets any developer upload an app to the Play Store, regardless of if it works, how it looks, or whether or not it can harm users. Malware scanning happens primarily after apps are uploaded, and though Google has recently taken steps to safeguard users with its Play Protect program, you don\u2019t have to depend on them.<\/p>\n<p>Below are the few tips to prevent malware attacks in Android systems :<\/p>\n<p>Tip 1: Don\u2019t Depend on Google Play Protect<\/p>\n<p>\u201cGoogle Bouncer\u201d will help identify malware in the apps within the play store<\/p>\n<p>Tip 2: Review App Permissions<\/p>\n<p>By minimizing app access, protect yourself from hackers obtaining an unnecessary amount of information about you. This practice also protects you from malicious agents (such as hackers) who might compromise the app to attack your device.<\/p>\n<p>Tip 3: switch Off Unknown Sources<\/p>\n<p>disabling \u201cUnknown sources\u201d won\u2019t deactivate the third-party apps. Instead, it will prevent unauthorized installation of non-Play Store apps from outside threats scheming to attack your device.<\/p>\n<p>https:\/\/blog.avira.com\/rottensys-preinstalled-malware\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The team of security researchers discovered there are millions Android brand new smartphone have been pre-installed malware, call \u201cRottenSys\u201d, somewhere along the supply chain. This looks like Android systems are more vulnerable to malware and other attacks. Android systems should consider running a pre-installation security check to be part of their OS, This will help [&hellip;]<\/p>\n","protected":false},"author":19033,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715219],"tags":[],"class_list":{"0":"post-5532","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-03-it-administrative-controls","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/19033"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5532"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5532\/revisions"}],"predecessor-version":[{"id":5533,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5532\/revisions\/5533"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}