Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to Tekie Geek at (347) 830-7322.

A Hosted VoIP System Comes with Real Benefits
Tip of the Week: Neat Windows 10 Features
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Worker data recovery Staten Island managed IT services NYC Downtime eWaste end-user files Tactics Webcam Windows 8 Fake News IT services New York City CCTV Data Management Data Security Device security Tech Term 3D Printing Solutions Chromebook History datto Managing Stress Remote Computing Microsoft 365 managed IT services staten island News Addiction Employer-Employee Relationship Antivirus Private Cloud Augmented Reality communications Training Staten Island IT support Backup Network Management Software Documents Monitoring Database Mobility Cryptocurrency IBM Alert Wi-Fi Cloud Cost Management iPhone Virtual Desktop Business Mangement Directions Congratulations Encryption IT Consultant Access Control Mobile Device Laptops Staten Island IT consulting tech support Miscellaneous Computer Care Bandwidth Vulnerabilities Telephone Uninterrupted Power Supply IT support Staten Islans IT support New York City Office Customer Resource management HTML Health Hacking Virtual Reality data loss IT services NYC Windows 7 malware Hard disk Analytics Users Flexibility Browsers Cybercrime YouTube Downloads Upgrade Hacks Twitter Website Integration Telephony Router Conferencing Information Save Money IT support NYC Digital Payment Security Black Market Sports Computers Freedom of Information Rental Service Microsoft Office Social Motion Sickness IT consulting NYC Displays PDF Holiday Best Practices Search Cybersecurity Lenovo Vulnerability Maintenance Drones Productivity Lithium-ion battery ransomware attacks Robot Writing IT Services Managed Service Malware Managed IT Services staten island managed services Tech Terms Username Mobile Security Microsoft Excel Television Data Protection Service Level Agreement Software License Apple G Suite Data Relocation Hardware Workstations Money Document Management Upload Automation Start Menu BDR Physical Security Screen Reader Electronic Medical Records Google Play Business Management Windows IT consulting firm computer repair Professional Services Technology Printers Cloud computing Staten Island Data storage Internet Hackers Language IT consulting Staten Island Data Breach Hard Drive Disposal Desktop IT consulting company managed it services Privacy VPN Mobile Device Management Hack Browser Project Management Bring Your Own Device Network Security Running Cable Telephone System Saving Time Wireless Technology Mouse Apps VoIP Society Cache SharePoint Redundancy The Internet of Things SaaS Printing Business Growth Settings Backup and Disaster Recovery Going Green email scam Wireless Staten Island computer support Gamification BYOD Domains Operating System Proactive IT it support computer support firms Reliable Computing Computer Malfunction LiFi Google Google Docs Regulations Error Evernote Scam Network Congestion tech support Staten Isalnd Server Bitcoin Google Maps Emails Phishing Corporate Profile data recovery Healthcare Cortana Flash computer support Startup Comparison Supercomputer Smartphone Budget Networking Passwords Smartphones Communication Retail Data Analysis Memory Advertising Saving Money Staten Island tech support Small Business Efficiency managed services Staten Island Vendor Social Media Excel Best Practice Android Email Accountants Visible Light Communication Social Network Bookmark Thank You Microchip Information Technology Business Technology Administrator Administration Tablets How To Distributed Denial of Service Content Filtering Windows 10 tech support Staten Island Legislation Vendor Mangement Devices Streaming Media computer services Staten Island Business Computing Meetings Managed IT Safety Legal Regulation Cleaning Voice over Internet Protocol Hard Drive Mobile Technology Computer App Company Culture Text Messaging IT Support Tip of the week Software as a Service Securty IT support Staten Island Wireless Headphones Government Gadgets Business computer repair Staten Island Tech Support Processors IT consulting Staten island Spam Travel Cabling Solid State Drive Remote Monitoring Education Tech Tip of the Week Websites Windows 10 Taxes Update Gmail Digital User Tips Staffing Computing Experience Productivity Blockchain Proxy Server Business Cards Google Wallet Managed Service Provider Samsung Term Specifications Two-factor Authentication Powerful Technology Solutions Collaboration Multi-Factor Security Outlook Download Multi-factor Authentication Password today ’s organizations End of Support Microsoft Word Access Hosted Solutions Nanotechnology WiFi IT support Automobile Touchscreen Botnet In Internet of Things Disaster Monitors Trends Mobile Devices Knowledge Network Emergency Patch Management Virtual Assistant Modem Accidental deletion Innovation Cooperation Audit Big Data Scalability Equifax Fileless Malware Telephone Systems Medical IT Office Tips Business Metrics Music Firewall User Tip Security Cameras Workers Managed IT Services CrashOverride Banking Hardware Solutions Health IT malware worms DDoS Virus Disaster Recovery Windows XP Spyware Paperless Office Hiring/Firing Business Continuity Office 365 Work/Life Balance PowerPoint SSID Management Public Cloud Tablet Printer Workplace Tips Notifications Employer Employee Relationship IT Management Virtualization Tracking Law Enforcement IT consulting Quick Tips VoIP Web Server Unified Threat Management Applications Hacker Processor Machine Learning Social Engineering Piracy Politics IT support firms Cloud Computing Laptop Artificial Intelligence Hosted Solution Content IT consulting firms Compliance computer services Time Management Google Drive Facebook IT services Staten Island computer support Staten Island CryptoLocker Google Calendar Customer Service Data Backup Identity Theft Internet of Things Ransomware File Sharing Bluetooth Recovery Unified Threat Management managed services Help Desk Vendor Management computer support NYC Outsourced IT Unified Communications Navigation Deep Learning Computing Infrastructure Entertainment

Newsletter Sign Up