Close Menu
    Facebook X (Twitter) Instagram
    Mediarun Search
    Facebook X (Twitter) Instagram
    Mediarun Search
    Home»Tech»Check if your phone is at risk: Security companies release list of dangerous apps
    Tech

    Check if your phone is at risk: Security companies release list of dangerous apps

    Osmond BlakeBy Osmond BlakeApril 20, 2023No Comments8 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Check if your phone is at risk: Security companies release list of dangerous apps
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Summarize the news

    • The Association of Security Companies has released a list of dangerous apps.
    • There are 60 apps, mostly games and financial regulators.
    • So far, 36 of them have been banned from the app stores.
    • Others, using third-party code libraries, have made updates.

    Apps use dangerous codes and put devices at risk
    Photograph: Casper Pimple/Reuters

    A group of digital security companies has warned users around the world not to uninstall at least 36 popular apps listed as dangerous on smartphones.

    The analyzed programs, all of which are for Android, use system vulnerabilities to collect information such as lists of other installed apps, usage history of Bluetooth and Wi-Fi connections, and location via GPS.

    The alert was issued by McAfee and other companies that are part of the App Defense Alliance, an alliance of digital security companies that analyzes application libraries for potential threats.

    The companies report that many of these apps are legitimate, but they use third-party libraries that leak confidential information, either due to internal problems or maliciously. Together, the programs exceed 100 million downloads.

    The full list contains 60 apps, and after risk detection, 36 of them have been removed from the Google Play Store, and the rest have updated coding so they don’t depend on shady libraries.

    Another risk is the ability to surreptitiously load web pages in the background, which opens up the possibility of hacking or of loading ads without the user’s knowledge.

    Most of the suspicious apps are games, and some are only available in South Korea. The main applications available in Western countries can be found below (the full list can be found here). on the McAfee blog):

    See also  Sony stops selling PS Now cards, reigniting Spartacus rumors

    point with L.PAY (Gamemore than 10 million downloads)
    slam brick breaker (Game+10 million)
    Expenses manager money and budget (financial planning+10 million)
    GOM launcher (media player+5 million)
    live score (Sports statistics+5 million)
    compass 9 (compass+1 million)

    Of the aforementioned apps, only Swipe Brick and Compass 9 have been removed from the Play Store – the others have updated the library.

    “Google has notified developers that their apps violate Google Play policies and that fixes are required to achieve compliance. Some apps have been removed from Google Play, while others have been updated by official developers,” the company said.

    This case is another one that reinforces the need to always update apps and avoid installing unknown software.


    Read below: Check out 7 tips to make your phone more secure and make it harder for thieves to use your apps

    Cases where cell phone theft results in financial losses that exceed the value of the device are increasingly prevalent. Criminals are taking advantage of banking apps to transfer via Pix, make online purchases, and even get loans. a R7 Talk to experts on the subject and list tips to reduce the risk and make it harder for thieves to work

    * Trained in R7Under the direction of Pablo Marquez

    1. Avoid using SMS as a password recovery method
    Oftentimes, the person who stole the mobile phone opens the banking application and performs the “password recovery” process. From there, she can receive an email or SMS with a code to complete the process.

    Guilherme Alves and Manu Halfeld, specialists at SaferNet Brasil, explain that with possession of the device, the thief gains access to the recovery information and reset the usage password. The direction in this case is to use an email that is not registered on the device for the procedure.

    two. Delete unnecessary apps and files
    Also, experts recommend that you clean your phone periodically, deleting unnecessary applications and files. “Never save information such as passwords and credit card numbers in note apps, and avoid leaving intimate photos or videos available on your phone,” they say.

    In the case of financial applications, it is recommended to leave only what is necessary in everyday life on the cell phone. Also, it is important to set bank transfer limits to low amounts. This procedure can be done through the application itself or with the help of the manager.

    Another option is to choose to set up financial apps on an old or rarely used phone you have at home.

    3. Put a password on the operator’s chip or get an electronic SIM card
    According to experts, it is common for thieves to remove the chip from a cell phone and place it in another unlocked device, in order to request password recovery mechanisms. “One way to prevent this from happening is to use a password on the cell phone’s chip, which is now required every time the device is restarted or powered on,” they explained. Thus, if the wrong password is entered multiple times by the attacker, the chip will be blocked.

    To implement the security procedure on Android, go to Settings > Security > SIM Lock. To activate the password, the standard PIN code of your SIM card will be required, which can be found on the one that the operator offers with the SIM card at the time of purchase. The default PIN must be changed to a password of your choice.

    On iPhone, go to Settings > Cellular > SIM Pin. Enter the default PIN and perform a PIN reset. To find your carrier’s default PIN, check the card that came with your SIM card, or contact your carrier

    The e-SIM is a virtual SIM, that is, it does not have to be inserted into the device and therefore cannot be removed. Some phones, such as the newer iPhones, have this technology, which can be activated with the carrier making it easier to block the phone number in the event of theft or theft.

    4. Find out your IMEI code
    IMEI is an identification record of the phone’s hardware itself, and is a kind of identity document unique to each cell phone. It is usually registered on the box of the device, on a white sticker

    The IMEI can also be obtained, on both Android and iOS devices, by dialing *#06#. Another way to find out the code is by clicking on the About phone section under Settings

    The recommendation is that the IMEI be written down in a preventive way, because in the event of theft or theft it can be used to contact the operator and request that the phone be blocked from being used for calls or accessing 3G / 4G networks – although the Internet can still be used via Wi-Fi

    5. Create a strong password to unlock your phone
    The suggestion is to choose difficult and different passwords for your social networks and apps whenever possible, preferring an alphanumeric password that mixes letters and numbers. To save these passwords, choose a password manager, preferring dedicated apps like 1Password and Lastpass, and avoid saving directly in the browser

    You should also avoid using the default screen unlock. If a cell phone has a biosensor, it can be used to facilitate daily life. Avoid using facial recognition unless your phone has a specific sensor, as is the case with iPhones

    Another tip is to set the auto-lock screen time as low as possible. This can be set in the settings of the cell phone itself.

    6. Prevent the ability to turn off Wi-Fi or 3G on your cell phone
    SaferNet Brasil experts explain that by doing this, you prevent access control to Wi-Fi and mobile networks when the cell phone is off, which could help with device trackers, which depend on access to the Internet.

    On Android, go to Settings > Lock screen > Lock screen settings > Enter your password > Turn on Network Security Lock. This path may vary by manufacturer.

    On iPhone, go to Settings > Touch/Face ID & Passcode, then scroll down to Allow Access When Locked. Uncheck the Control Center option. If you don’t see the option, check with your phone manufacturer to see if this setting is available on your phone.

    7. Download security scanning apps
    Two-step verification is an effective way to protect unauthorized access to information, as it creates a double layer of protection, as it requires a code or password to access the account

    Guilherme and Manu point to apps like Authy, which are free and have password control to access. They add, “It is also possible to maintain access to the authentication system on a trusted device, such as a personal computer, allowing you to have greater control over your accounts even if your cell phone is stolen or stolen.”

    When you set up 2-Step Verification on your accounts, you’ll be sent one-time backup codes so you can access the apps. They should be stored safely and away from the phone, as they can be used if the device is lost to restore access to accounts
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Osmond Blake

    "Web geek. Wannabe thinker. Reader. Freelance travel evangelist. Pop culture aficionado. Certified music scholar."

    Related Posts

    Lunarsaber Project: Solar-Powered Light Poles on the Moon.

    October 29, 2025

    The remote stars may not be exactly a star

    August 19, 2025

    “Sony started doing stupid things with Jim Ryan,” Michael Pashter says.

    August 18, 2025
    Leave A Reply Cancel Reply

    Navigate
    • Home
    • Top News
    • World
    • Economy
    • science
    • Technology
    • sport
    • entertainment
    • Contact Form
    Pages
    • About Us
    • Privacy Policy
    • DMCA
    • Editorial Policy
    • Contact Form
    MAIN MENU
    • Home
    • Top News
    • World
    • Economy
    • science
    • Technology
    • sport
    • entertainment
    • Contact Form
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.