Last updated on August 18th, 2017
Featured Picture Credits : CM Blog
“Malware” is a term used to describe a intrusive software or a piece of code. It can can exist in variety of forms including Virus, Trojans, Worms, spyware, adware and other malicious or untrusted software.
You May Also Like – MediaTek Geared Up To Fight Qualcomm
As we know that the Google Play Store, has very few restrictions on the developers publishing their app on their market. So, this helps malicious developers publish their intentional untrusted software apps. Well, the restrictions on one side cannot be increased because of the Android’s Open Source policy. But the Google Play Store should be cleaned regularly by keeping a check on it.
It may be too much difficult to spot a malicious app which barely is downloaded among millions of apps. So, the Cheetah Mobile took one step forward for a cleaner and safer app market environment. The CM Security Lab took an initiative to detect the clever malicious apps present in the Play Store.
By the time it started, 5 malicious apps were found and reported to the Google Play Store.
The apps detected by the CM Security Research Lab are given below ( apk package name ) :
The malware present in the above apps is termed as “Hideicon“. CM Security Researchers wrote:
” These viruses disguise themselves as useful tools like flashlights and compasses, but once users install and open them, they hide their icons and start performing rogue behaviors. They tend to steal users’ personal data and push full screen ads frequently to victim’s devices. Since the malware icon has been hidden, it’s hard for users to track down the source of these ads. “
How To Stay Safe From These Malwares ? ?
( Official Tips by the CM Blog )
1. Only download apps from reputable app stores such as Google Play. Even though it’s not 100% safe, it’s significantly harder to contract a virus from here compared to other 3rd party stores.
2. Use Clean Master and CM Security to regularly scan for viruses. The CM Security Research Lab is always working hard to bring you perfect protection.
3. Glance at app reviews. People will often rate an infected app poorly and will usually warn others through the app reviews.
4. Be on the alert for anything strange your phone might be doing, even if it is just consuming excess battery power.
5. Review all permissions requested by an app upon installation to determine whether it’s asking for too much (e.g. requesting to work with your contacts).
Join our list
Subscribe to our mailing list and get interesting stuff and updates to your email inbox.