A new Android Trojan that displays some botnet characteristics has emerged from China, Lookout Mobile Security warns.
A new Android Trojan that displays some botnet characteristics has emerged from China, Lookout Mobile Security warns. Called Geinimi, the malware can compromise a significant amount of information on a user's Android smartphone and send it to remote servers, the security developer said in a blog. Once installed on the phone, it could allow the server's owner to control the mobile device, says Lookout.
"Geinimi is effectively being 'grafted' onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions," Lookout says in its blog. "Though the intent of this Trojan isn't entirely clear, the possibilities range from a malicious ad network to an attempt to create an Android botnet."
Lookout has written and delivered an automated update to protect existing free and premium users from the Trojan. Consumers can protect themselves from Geinimi, and from the anticipated surge in future Trojans targeting mobile apps, by downloading apps only from trusted sources such as reputable developers, Lookout says. Likewise, common sense should be used when reading the permissions for each app, the company recommends.
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?