Malware Tags

Grayware: Dissolving every shade around the mobile device market

One of the most problematic areas in mobile security today is “.” Η διαχωριστική γραμμή μεταξύ του νόμιμου και του κακόβουλου λογισμικού δεν είναι ξεκάθαρη και το grayware συχνά ταλαντεύεται ανάμεσα στα δύο. Το grayware αφορά εφαρμογές που μπορεί να μην έχουν κρυμμένο κάποιο αναγνωρίσιμο αλλά μπορούν με κάποιο τρόπο να προκαλέσουν βλάβη ή να ενοχλήσουν τον χρήστη. Για παράδειγμα, μπορεί να εντοπίζουν τη θέση του, τις συνήθειες περιήγησης στο διαδίκτυο και να διοχετεύουν ανεπιθύμητες διαφημίσεις. Σε πολλές περιπτώσεις, οι δημιουργοί του grayware συχνά διατηρούν ένα προκάλυμμα νομιμότητας, τονίζοντας τις of the application, in the fine print of the software license agreement.

Malware-Tags

The grayware is not a new phenomenon since it first started a decade ago, attracting attention when unwanted programs such as spyware, were integrated with free apps. As PC users became more aware, they knew what they were installing, and that kind of penetration into computers was extinguished. However, the arrival of a new generation of smartphones has created a new software market. Consumers are now prone to face this particular laptop market with the same degree of naivety that could face the desktop market ten or fifteen years ago. Mobile applications are often installed with great ease, without much thought of what they are capable of doing.

How big is the problem? Data Collected by Symantec, suggest that more than a third of mobile apps may be considered grayware. By the time of its new edition Mobile Security last year, Norton Mobile Insight, Symantec's Application Analysis Tool, analyzed more than four million applications, and showed that 1.5 millions can be classified as malware.

The Grayware it can be anything from an application that "plays" with the privacy of the user, to something more complex. For example, the Symantec recently discovered a grayware app that encouraged Instagram users to share their codes, aiming to increase likes and followers. The app, known as InstLike, was for a time available in the Apple App Store and the , and was later removed by both companies. The app claimed to be able to provide followers and likes for free. But it was asking for Instagram login details. The app then granted significant control over the user's Instagram account, automatically liking photos without user interaction.

One kind of mobile grayware who knows development in recent years is known as "madware". This refers to applications that use aggressive ad libraries. The ad library is an element of the application that can collect user information for purposes of showing targeted advertising. It is a common feature of free apps, which are usually based on advertising for their revenue. However, some ad libraries adopt aggressive tactics, such as leaking personal information, putting ads on the notification bar, creating image ads, or changing bookmarks.

SYMANTEC-72dpi

A recent Symantec study found that of 65 known ad libraries, more than 50% ranked as madware. The percentage of applications using madware is rising steadily. For example, 23% of apps on the Google Play store last year can be considered madware, while 2010 was just 5%.

What can be done with grayware? Due to the fact that it does not go beyond the limits of illegality, companies with antivirus solutions usually can not block it. Occasionally, they are removed from official mobile marketplaces such as Apple App Store or Google Play as they violate terms and conditions.

Knowledge is the best defense. In the same way that PC users are more careful about what they are installing on computers, smartphone users need to realize what they are downloading to their device and look for what rights the application is asking for.

There is also a range of tools that can help users identify which applications can request special access to the smartphone. For example, the Norton Spot will scan your Android phone for aggressive ad libraries that can spam your device and identify which applications are related to them.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).