{"id":5989,"date":"2018-11-28T15:35:14","date_gmt":"2018-11-28T20:35:14","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5989"},"modified":"2018-11-28T15:35:14","modified_gmt":"2018-11-28T20:35:14","slug":"8-popular-android-apps-caught-up-in-million-dollar-ad-fraud-scheme","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/11\/28\/8-popular-android-apps-caught-up-in-million-dollar-ad-fraud-scheme\/","title":{"rendered":"8 Popular Android Apps Caught Up In Million-Dollar Ad Fraud Scheme"},"content":{"rendered":"<p><b>Cheetah Mobile<\/b>\u2014a prominent Chinese app company, known for its popular utility apps like Clean Master and Battery Doctor\u2014and one of its subsidiary <b>Kika Tech <\/b>have allegedly been caught up in an Android ad fraud scheme that stole millions of dollars from advertisers.<\/p>\n<p>Here&#8217;s the list of seven Cheetah Mobile apps and one Kika app, which received an investment from Cheetah Mobile in 2016, caught participating in the fraudulent ad scheme:<\/p>\n<ul>\n<li>Clean Master (with 1 billion users)<\/li>\n<li>Security Master (with 540 million users)<\/li>\n<li>CM Launcher 3D (with 225 million users)<\/li>\n<li>Battery Doctor (with 200 million users)<\/li>\n<li>Cheetah Keyboard (with 105 million users)<\/li>\n<li>CM Locker (with 105 million users)<\/li>\n<li>CM File Manager (with 65 million users)<\/li>\n<li>Kika Keyboard (owned by Kika Tech with 205 million users)<\/li>\n<\/ul>\n<p>https:\/\/thehackernews.com\/2018\/11\/android-click-ad-fraud.html<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cheetah Mobile\u2014a prominent Chinese app company, known for its popular utility apps like Clean Master and Battery Doctor\u2014and one of its subsidiary Kika Tech have allegedly been caught up in an Android ad fraud scheme that stole millions of dollars from advertisers. Here&#8217;s the list of seven Cheetah Mobile apps and one Kika app, which [&hellip;]<\/p>\n","protected":false},"author":17266,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-5989","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/17266"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5989"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5989\/revisions"}],"predecessor-version":[{"id":5990,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5989\/revisions\/5990"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}