Arxan Technology is the infographic that will awaken mobile users

Cybercriminals know the value of popular mobile apps, and in 2014 they cloned 97% of paid apps available online for και το 87% για το λειτουργικό σύστημα iOS. Η κλωνοποίηση βέβαια έγινε για να συσκευάσουν malware. Η έρχεται από μια έρευνα που πραγματοποιήθηκε από την εταιρεία Arxan Technology.

Article Writer Note
Before looking at the numbers and data the company lists, let us add what sample of research is small, which makes it very likely that the results are not indicative of what is really happening.

Also add that which you will see below, serves the purposes of the company just fine.

Arxan Technology
Although the numbers are quite high, in the case of Android devices there is an improvement over the previous year, as well as the previous year.

For iOS, the report is more dismal as 2014 saw a 31% increase, indicating the growing interest in of Apple's operating system.

Arxan Technology, to carry out the research, downloaded 100 paid apps for both platforms and searched for cloned applications in third-party online stores as well as on various distribution sites and torrent sites.
The survey also included 20 popular applications running for free.

The results are quite worrying as you will see yourself in the infographic created by the company.

We should mention that Apple's jailbroken devices are always at greater risk. So beware of the software you download for your device. Installing software from non-trusted sources should be avoided. The same goes for Android devices as well.

See infographic

state of security 2014 Arxan Technology

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).