Arxan Technology is the infographic that will awaken mobile users

Cybercriminals know the value of popular mobile apps, and in 2014 they cloned 97% of paid apps in online stores for Android and 87% for σύστημα iOS. Η κλωνοποίηση βέβαια έγινε για να συσκευάσουν . The information comes from a survey conducted by the company Arxan Technology.

Article Writer Note
Before looking at the numbers and data the company lists, let us add what sample of research is small, which makes it very likely that the results are not indicative of what is really happening.

We should also add that the infographic that you will see below, serves the purposes of the company very well.

Arxan Technology
Although the numbers are quite high, in the case of Android devices there is an improvement over the previous year, as well as the previous year.

For iOS, exposure is more unpleasant as 2014 has recorded an increase of 31%, indicating the growing interest for Apple's operating system users.

Arxan Technology, to conduct the research, downloaded 100 paid apps for both platforms and searched for cloned apps in third-party online stores as well as various distribution websites and .
The survey also included 20 popular applications running for free.

The results are quite worrying as you will see yourself in the infographic created by the company.

We should mention that jailbroken Apple devices are always at greater risk. So watch out for it which you will download for your device. Installing software from untrusted sources should be avoided. Of course, the same applies to Android devices.

See infographic

state of security 2014 Arxan Technology

iGuRu.gr The Best Technology Site in Greeceggns

Get the best viral stories straight into your inbox!















Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).