{"id":1993,"date":"2013-06-26T00:00:00","date_gmt":"2013-06-26T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/26\/mobile-malware-attacks-grow-614-in-year-to-march-study\/"},"modified":"2021-12-30T11:40:26","modified_gmt":"2021-12-30T11:40:26","slug":"mobile-malware-attacks-grow-614-in-year-to-march-study","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/26\/mobile-malware-attacks-grow-614-in-year-to-march-study\/","title":{"rendered":"Mobile malware attacks grow 614% in year to March &#8211; study"},"content":{"rendered":"<p>Attacks on mobile devices increased 614 percent between March 2012 and March 2013, compared to 155 percent growth a year earlier, according to Juniper Networks. Nearly 73 percent of malware are Fake Installers or SMS Trojans, which exploit holes in the nascent mobile payment systems. These threats either trick users or secretly send text messages to premium numbers set up by attackers to turn a quick profit.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">The Juniper Networks Mobile Threats Centre (MTC) identified more than 500 third-party \u201calternative\u201d app stores globally where our researchers found mobile malware. They are also quite popular for device users who \u201cjailbreak\u201d or root their phones, and are looking for pirated or unsanctioned apps. Of these alternative app stores, three out of five are in China or Russia, markets infamous for malware.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The Juniper Networks Mobile Threats Centre (MTC) is studying the types of permissions users are required to give to apps in order to install them. Building on that research, Juniper found was an increase in the number of permissions required with free applications much more likely to ask for large amounts of information.<\/p>\n<p>Link: <a href=\"http:\/\/www.telecompaper.com\/news\/mobile-malware-attacks-grow-614-in-year-to-march-study--951813\">http:\/\/www.telecompaper.com\/news\/mobile-malware-attacks-grow-614-in-year-to-march-study&#8211;951813<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1993","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1993"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1993\/revisions"}],"predecessor-version":[{"id":4480,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1993\/revisions\/4480"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}