Beware Fake Smartphone Apps

27 Aug 2015

Beware Fake Smartphone Apps

The advent of smartphones also saw the creation of apps. From social media to streaming movies and everything in between, apps have become a major part of our lives and as a result have become something for criminals to exploit.

One of the easiest ways for hackers to get into your phone is to trick you into downloading a fake app. A prime example of this was the plethora of clones of the stupidly hard and addictive game Flappy Bird. Due to its huge success and popularity hackers saw an opportunity. Before long app stores were flooded with fake versions of the game.

Avoid App Clones

The original game may not have remained available for long but it was enough time for hundreds of clones. According to McAfee, hundreds of the Flappy Bird clones were available and remain in app stores today. The company said that it had tested 300 of the clones and found that nearly 80% of them contained Malware.  

Many smartphone users who had downloaded one of the fakes found that their devices were now infected by malicious software which caused damage to them, in the worst case the malware took full control of the device and rendered them unusable.  

How to avoid Malware infected Apps

Avoiding harmful apps is mostly down to common sense. Before downloading an app always check the app creator’s name, the apps description and read reviews. If an app has one star reviews and warnings from other users then avoid it like the plague.  Even if an app looks legit make sure to now grant it permission to access all parts of your phone, always read any terms and conditions.

With the wide arrange of cyber threats out there that are targeting smart devices you should also always use mobile anti-virus software.

Don’t become a target or victim of cybercrime. Seek the advice of the professionals at PGI Cyber.

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP