security

Delete Android apps to avoid horrifying 'jack attack' that steals money – The US Sun


ANDROID users have been urged to delete certain apps from their devices or risk hackers making money from them.

A cryptocurrency-mining malware has been disguising itself as legitimate-looking applications on Android devices.

Android users have been urged to delete certain apps from their devices

1

Android users have been urged to delete certain apps from their devicesCredit: Getty

WHAT IS CRYPTOJACKING?

Cryptojacking is a type of malware that uses a computer or smartphone’s processing power to mine cryptocurrency for hackers.

This can slow down a user’s device, and it can also cause their smartphones to overheat.

Cryptojackers can infect your device in a number of ways, including phishing attacks, malicious websites, and infected software.

Phishing is a scam where attackers deceive people into revealing sensitive information.

Once a user’s device is infected, the cryptojacking malware will run in the background and start mining cryptocurrency.

HOW TO PROTECT YOURSELF

There are a number of ways that Android users can mitigate their risk of falling victim to a cryptojacking attack.

First, you should always avoid installing apps from unofficial Android stores.

“Unlike Google Play and Apple’s App Store, which have measures in place to review and vet apps to help ensure that they are safe and secure, third-party sites might very well not,” cybersecurity company McAfee noted.

“Further, some third-party sites might intentionally host malicious apps as part of a broader scam.”

Furthermore, you should never download anything from strange pop-up windows.

It can also be helpful to read user reviews and keep Google’s Play Protect feature active.

You should also always keep your device updated with the latest software and security updates.

Readers Also Like:  Proton Pass password manager leaves beta: here is our take - Ghacks

“Comprehensive online protection software can protect you in several ways,” McAfee said.





READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.