As per results of the Kaspersky Protection Message 2012, 99% of recently found mobile harmful programs target the Android operating system foundation, while only a very little bit objectives Coffee and Symbian-based mobile phones. The review found that 2012 was the second year to show intense growth in Android operating system viruses. From a minimal eight new unique harmful programs in Jan 2011, the normal monthly development amount for new Android operating system viruses this year went up to more than 800 examples. This year, Kaspersky Lab determined a typical of 6300 new mobile viruses examples every month. Overall, in 2012, the number of known harmful examples for Android operating system increased more than eight times.
The majority of Android operating system viruses can be separated into three main groups according to performance. Elaborating further, the review contributes that “SMS Trojans” vacant victims’ mobile records by delivering SMS text messages to premium-rate figures. Backdoors provide unexpected access to a smart phone, making it possible to set up other harmful programs or grab personal information. Malware objectives the unexpected collection of information, such as address books and security passwords (or even individual photos in some cases).
In the first half of 2012, Backdoors, SMS Virus viruses and Malware combined included 51% of all recently found Android operating system viruses. In the Top 10 graph of Android operating system viruses that was obstructed by Kaspersky Mobile Protection or Kaspersky Tablet Protection, SMS Virus viruses showed up to be the most extensive, with programs showing unwanted ads to customers in second place.
Less extensive but by far the most dangerous are mobile banking Virus viruses that often work together with their pc alternatives, as was the case with Carberp-in-the-Mobile.
The Android operating system foundation allows software installation from untrusted sources, and one of the best ways to guarantee an disease is to set up programs from dubious websites. However, viruses on the formal Google Perform program submission foundation is another trend that started this year and ongoing in 2012, despite Google’s best initiatives to reduce cybercriminal activity. One of the most uncommon examples of mobile viruses in 2012 was the "Find and Call" program that managed to put into the Google Perform shop as well as Apple’s app shop.
The FakeRun Android operating system Virus, which is one of the most extensive in the United States but also frequent in other countries of the world, does not grab users’ personal information. It connected to a vast family of phony programs that do nothing but display ads that generate income for their designer. One particular harmful program known as Virus.AndroidOS.FakeRun.a that showed up in Google Perform forced customers to give it a five-star rating and share information about the app on their Facebook records before it would even start. The only thing that customers received though was frustrating ads.
One of the most popular mobile Virus viruses in European countries is Virus.AndroidOS.Plangton.a. To an unskilled smart phone owner, the only proof of its existence are the ads that appear every now and then and some uncommon records in the bookmarks section of the Android operating system web internet browser. After disease, the Virus joins to a control server and changes website favorites as well as opening a web page that reveals customers to potential online frauds.
Russia’s mobile Internet landscape is filled with SMS Virus viruses – harmful programs delivering text messages to premium-rate figures that basically takes users’ cash. For example, Trojan-SMS.AndroidOS.Opfake.bo cover up itself as an user interface skin, but in fact registers the user to costly “premium” content.
In the first half of 2012, Backdoors, SMS Virus viruses and Malware combined included 51% of all recently found Android operating system viruses. In the Top 10 graph of Android operating system viruses that was obstructed by Kaspersky Mobile Protection or Kaspersky Tablet Protection, SMS Virus viruses showed up to be the most extensive, with programs showing unwanted ads to customers in second place.
Less extensive but by far the most dangerous are mobile banking Virus viruses that often work together with their pc alternatives, as was the case with Carberp-in-the-Mobile.
The Android operating system foundation allows software installation from untrusted sources, and one of the best ways to guarantee an disease is to set up programs from dubious websites. However, viruses on the formal Google Perform program submission foundation is another trend that started this year and ongoing in 2012, despite Google’s best initiatives to reduce cybercriminal activity. One of the most uncommon examples of mobile viruses in 2012 was the "Find and Call" program that managed to put into the Google Perform shop as well as Apple’s app shop.
The FakeRun Android operating system Virus, which is one of the most extensive in the United States but also frequent in other countries of the world, does not grab users’ personal information. It connected to a vast family of phony programs that do nothing but display ads that generate income for their designer. One particular harmful program known as Virus.AndroidOS.FakeRun.a that showed up in Google Perform forced customers to give it a five-star rating and share information about the app on their Facebook records before it would even start. The only thing that customers received though was frustrating ads.
One of the most popular mobile Virus viruses in European countries is Virus.AndroidOS.Plangton.a. To an unskilled smart phone owner, the only proof of its existence are the ads that appear every now and then and some uncommon records in the bookmarks section of the Android operating system web internet browser. After disease, the Virus joins to a control server and changes website favorites as well as opening a web page that reveals customers to potential online frauds.
Russia’s mobile Internet landscape is filled with SMS Virus viruses – harmful programs delivering text messages to premium-rate figures that basically takes users’ cash. For example, Trojan-SMS.AndroidOS.Opfake.bo cover up itself as an user interface skin, but in fact registers the user to costly “premium” content.