![]() |
A new Trojan virus known as ‘Android/Smssend’ can steal sensitive personal data from Android devices. Android/Smssend is a premium service abuser family malware that enters through Android applications and infects the device. The Computer Emergency Response Team of India (CERT-In) said that cyber criminals modify a legitimate application and make it malicious. This is then re-distributed via marketplace or other separate channels.
After infecting the Android device, ‘Android/Smssend’ malware sends text messages to numbers on the contact list and also to premium rate numbers. These SMS messages contain malicious links which when clicked by the receiver downloads itself or a different threat onto the device. On this, CERT-In says that after a successful infection of the malware, basic information about the Android device such as IMEI number, device ID, device type among others are compromised and it can even install spyware on the targeted device. This malware also steals contacts and pictures, tracks the location, steals passwords, illegally accesses text messages, crashes a complete system and steals personal banking information when logged in. Additionally, it also installs other sort of spyware and even disables firewall and anti-virus program that is installed on the device to defend itself. To ensure safe computing, eScan recommends few counter-measures to avoid such threats:
In Homer’s Iliad, the Greeks won the Trojan War by hiding in a large, hollowed-out wooden horse. They crept out at night and took over the fortified city of Troy. In today’s computer world, Trojan horses are no myth—they’re a grim reality for every computer user. A virus can be placed on or downloaded to your PC any time without your knowledge. These downloads are called Trojan horses. The Trojan Horse of the Digital AgeA Trojan horse is a destructive program that masquerades as a benign application or upgrade. Most Trojans are delivered via emails, online services, and downloads, such as free games, applications, movies, and greeting cards. Many of us don’t realize how vulnerable we are. How Trojans Wreak HavocTrojans vary in the nefarious acts they perform once inside a machine. They can initiate harmless pranks that display a “cute,” obscene, or political message. They can steal your passwords or personal financial information and relay them to an identity thief via the Internet. They can even become “logic bombs” that erase all your data and try to damage hardware. Once inside your computer’s operating system, Trojans can track keystrokes; this allows usernames and passwords to be collected and sent from your system without your knowledge. And, if you think you don’t have anything valuable on your machine, think again. Most personal data is now stored on our computers, including full names and addresses, credit card and financial information, Social Security numbers, personal photos and letters, and more. This can be enough for someone to steal your identity or impersonate you. Experts warn that one of the areas of increasing risk is malicious files, masquerading as legitimate downloads, being posted on the Internet. Adult newsgroups are particularly dangerous, since many users believe that the files they are downloading are simply .jpeg or .mpeg files, but are actually are remote-access Trojan horses that provide access to your PC. Viruses Worms Trojan Horses Now that you know the difference between the three types, here’s what you can do to protect yourself:
|
We Provide Services On Following Cities |
|||||
*Ethical Haker in Ludhiana | *Ethical Hacking Services in Amritsar | *Ethical Hacking Services in Mumbai | |||
|