The malware, better known as malicious software, is one of the most important threats to users and businesses since much of the cyber attacks have to do with the implementation of one. Now we know, thanks to the cybersecurity company, Check Point Research, which ones are the most used today and how to protect ourselves from them.
According to said company, the most used software in July 2021, which specifically attacked mobile phones are:
It is a malicious Android application that was first discovered in March 2019. It is used to download other malicious applications and display ads. It is able to bypass mobile antivirus programs, as well as reinstall itself in case the user removes it.
It is malware for Android whose main function is to display ads. However, it can also gain access to the security keys embedded in the operating system, allowing a cybercriminal to obtain confidential user data.
It is a spy and banking Trojan for Android developed by Yanbian Gang, a group of Chinese hackers. This malware uses DNS spoofing to distribute infected Android applications in order to collect personal and financial information.
What to do to avoid getting infected?
While it is true that each malware operates differently, there are some general tips that you can keep in mind to avoid falling into one:
Activate an antivirus: It doesn't hurt to have an antivirus that analyzes the applications that are downloaded and installed on the cell phone.
More secure password: Always remember to keep a password that can hardly be guessed.
App downloads: Avoid downloading and installing applications from sites outside the Play Store, on Android, or the App Store, in the case of Apple.
Visit only official stores: When making a purchase online, you must make sure that it is the official page, since, if you do not verify the page, you could be a victim of fraud and the theft of personal data.
Do not share personal information: You must be very careful when sharing in a chat or on your social networks, sensitive information such as your bank account, password, or personal data; the correct thing is to do it through PDF files or email.
Browse secure pages: Browse certified web pages that start with "https: //", which are usually the safest and with protected information.