The mobile malware, dubbed "Geinimi", which usually poses as gaming applications, has been uploaded onto third-party Chinese Android app markets. If installed, the malware sends personal data from compromised devices (specifically device identifiers, location information and list of installed applications) to a remote server.
Friday, December 31, 2010
Chinese Bot Attacks Androids
A Trojan Horse app capable of stealing data from infected Android smartphones, and bundled with botnet-style functionality, has appeared in China, The Register reports.
The mobile malware, dubbed "Geinimi", which usually poses as gaming applications, has been uploaded onto third-party Chinese Android app markets. If installed, the malware sends personal data from compromised devices (specifically device identifiers, location information and list of installed applications) to a remote server.
The mobile malware, dubbed "Geinimi", which usually poses as gaming applications, has been uploaded onto third-party Chinese Android app markets. If installed, the malware sends personal data from compromised devices (specifically device identifiers, location information and list of installed applications) to a remote server.
Gary Kim was cited as a global "Power Mobile Influencer" by Forbes, ranked second in the world for coverage of the mobile business, and as a "top 10" telecom analyst. He is a member of Mensa, the international organization for people with IQs in the top two percent.
Subscribe to:
Post Comments (Atom)
Yes, Follow the Data. Even if it Does Not Fit Your Agenda
When people argue we need to “follow the science” that should be true in all cases, not only in cases where the data fits one’s political pr...
-
We have all repeatedly seen comparisons of equity value of hyperscale app providers compared to the value of connectivity providers, which s...
-
It really is surprising how often a Pareto distribution--the “80/20 rule--appears in business life, or in life, generally. Basically, the...
-
One recurring issue with forecasts of multi-access edge computing is that it is easier to make predictions about cost than revenue and infra...
No comments:
Post a Comment