McAfee warns: Malware is everywhere in 2019
McAfee recently announced its latest Mobile Threat Report at the MWC 2019 event. According to McAfee's forecast, 2019 malware will be everywhere, counterfeit applications and code-digging operations. chemistry will rise.
In addition, the McAfee report also mentioned the rapid development of threats targeting IoT technology items and mobile devices in 2018.
Specifically, according to McAfee in 2018, there are more than 600 different malicious cryptocurrency applications that appear in more than 20 application stores, backdoors in mobile applications and rapidly destructive banking Trojans. The fake applications also rose strongly with an alarming increase of 50%, from 10,000 in June 2018 to nearly 65,000 at the end of that year.
The most prominent among the fake applications are fake mobile beta apps for Fortnite Battle Royale, the hottest game of 2018. Not just Fortnite Battle Royale but any popular app or game It is also possible to take advantage of users who are 'immature' through links to non-Google Play Store sources.
The purpose of these fake applications is to put ads on users' devices or install hidden applications or malware.
To prevent fake applications, users should be careful when selecting applications from unofficial sources.
Attack from every front?
With 2019, McAfee predicts malware will be everywhere. This means that not only PCs and smartphones, but IoT technology items will also become targets of attacks.
The voices of voice assistants will also be exploited by hackers in order to achieve a bad purpose. Currently around 25 million voice assistants are used in the world and they often have control over everything in a smart home such as heating, lighting systems, smart locks .
According to security companies, the ultimate goal of cyber attacks from developing botnets to stealing information is to force users to pay ransom.
You should read it
- A series of malicious applications that collect user data, delete immediately if you are installing
- Malicious Web Applications: How to detect and block them
- 2011: malware transferred from computer to ... pocket pants
- 2 Dangerous Trojans are being distributed heavily through fake VPN webs
- Detected 3 fake YouTube applications that secretly record and steal user information
- Fileless malware - Achilles heel of traditional antivirus software
- The list of applications containing malicious code or malicious ads should be removed from the phone
- Malware and user security bugs are found in top free VPN applications
- 9 malicious applications on Google Play, if installed, should be removed immediately
- How does malware get into smartphones?
- How to choose antivirus applications for Windows and Mac
- Detect 17 applications that contain malware trojans on the App Store, if you have them on your computer, you should immediately remove them
Maybe you are interested
4 Security Steps to Follow When Using Remote Access Applications
6 accurate weather forecast applications on your phone
How to create a to-do list using the applications you are using
This tool will help bring iOS-specific applications to Android
4 must-have photo editing applications on iPhone
Top running applications, measuring running distance