Tag Archive for: Google

Top Antivirus Alternatives to Google Play Protect


In the ever-evolving digital landscape, Android devices have emerged as a prime target for malicious actors. Despite Google’s efforts to fortify its platform with Google Play Protect, recent studies reveal that this built-in security measure falls short in comparison to other antivirus solutions. As of February 14, 2024, Android users are strongly advised to consider alternative antivirus options to safeguard their devices and data.

Google Play Protect: An Inadequate Guard

Google Play Protect, a security feature pre-installed on Android devices, is designed to detect and eliminate harmful apps. However, recent findings from AV-TEST, an independent organization specializing in IT security and antivirus research, expose the deficiencies of this shield. In a six-month endurance test, Google Play Protect demonstrated a significantly lower malware detection rate than its competitors, leaving Android users vulnerable to a multitude of threats.

Top Alternatives to Google Play Protect

In the quest for optimal protection, Android users have access to a plethora of free antivirus software options. Let’s explore some of the leading choices:

  • AVG Antivirus: With over 100 million downloads on Google Play, AVG Antivirus offers robust protection against viruses, malware, and privacy intrusions.
  • Norton 360: Mobile Security: This comprehensive security solution boasts advanced features such as a smart firewall, web protection, and app adviser.
  • Avast Antivirus: Avast provides real-time protection, ensuring that your device remains secure from the latest threats.
  • Dr. Web Security Space: Recognized for its high detection rates, Dr. Web offers a reliable defense against various malware.
  • Kaspersky Antivirus & VPN: Kaspersky’s combination of antivirus and VPN technologies guarantees privacy and security across multiple fronts.
  • Lookout Security & Antivirus: In addition to antivirus protection, Lookout provides features such as identity protection and safe browsing.
  • Bitdefender Mobile Security: Bitdefender’s antivirus engine and comprehensive security tools ensure top-notch protection for your Android device.
  • ESET Mobile Security & Antivirus:…

Source…

Spyware behind nearly 50% of zero-days targeting Google products


Google on Tuesday reported that commercial surveillance vendors (CSVs) are behind nearly 50% of the known zero-day exploits targeting Google products.

The news brought to light the increased prevalence of CSVs and the potential threat of spyware being used against not just famous journalists, politicians and academics, but ordinary citizens and businesspeople.   

Google’s 50-page report found that from mid-2014 through 2023, security researchers discovered 72 in-the-wild zero-day exploits affecting Google products with the Google Threat Analysis Group (TAG) attributing 35 of the zero-days to the CSVs.

“The commercial surveillance industry has emerged to fill a lucrative market niche: selling cutting edge technology to governments around the world that exploit vulnerabilities in consumer devices and applications to surreptitiously install spyware on individuals’ devices,” wrote the Google researchers. “By doing so, commercial surveillance vendors (CSVs) are enabling the proliferation of dangerous hacking tools.”

Morgan Wright, chief security advisor at SentinelOne, said Google’s new information means that anyone, anywhere, any place, is at risk.

The proliferation of mobile computing, along with continuous discoveries of zero-day exploits, means spyware will become a booming market that will continue to grow because there’s demand for these capabilities, Wright said. What’s of most concern, Wright continued, is that the spyware capabilities that were once the exclusive province of nation-state intelligence organizations are available off-the-shelf to anyone with a big enough bank account.

“The number of threat actors will grow exponentially, making it a very challenging exercise to identify and defend against these threats,” said Wright. “For the security community, this means there is no rest. Ever. The vectors of attack will change minute-by-minute and hour-by-hour. Once a threat pops up and is identified and dealt with, many more will develop to take its place. This will force certain decisions about open versus closed platforms. To have more freedom and security, it may require tighter controls.”

Marina Liang, threat intelligence engineer at Interpres, said…

Source…

Android malware posing as Google Chrome could steal your photos, contacts, and more — how to spot the fake


An updated version of the XLoader malware for Android devices doesn’t require any user interaction to launch once installed, according to researchers at McAfee (via BleepingComputer). Of course, you still need to click the malicious link in an SMS message to download and install the malware, but this XLoader variant doesn’t require users to manually launch the malware anymore.

Right now, the malware is being distributed through SMS texts on Android devices. If you’re targeted, the SMS text will include a shortened URL that, if clicked on, will direct you to a website to download an Android APK installation file for a mobile app.  McAfee says that, “While the app is installed, their malicious activity starts automatically.”

Source…

Messaging, News Apps Stuffed With Data Stealing Malware Listed On Google Play Store; Check List Here


VajraSpy Malware: Instances of malicious apps appearing on Google Play Store have been on the rise in recent times. Continuing this series, ESET researchers identified 12 Android apps with malicious code, six of which were listed on the Play Store. Most of these apps were messaging apps with one being from the news category. The apps execute VajraSpy, a remote access trojan (RAT) code of the Patchwork APT group on the affected device.

Depending on the permissions granted to these apps, they can steal call logs, contacts, messages and files from an affected device. Plus, it can extract messages from WhatsApp and Signal, record calls, click photos using the camera, intercept notifications and search files on the compromised handset. Among the most affected regions with this campaign were Pakistan and India. According to ESET Research, the apps on Play Store absorbed over 1,400 installs.

Also Read: Clean Malware From Android And Windows Devices With These Govt-Approved Free Tools

The cybersecurity firm managed to geolocate 148 devices compromised with the VajraSpy due to its weak security protocol. The blog of WeLiveSecurity stated that these bad actors used a “honey-trap romance scam” to lure victims to install the malware. Here is the list of apps that were available on the Play Store:

 Privee Talk

 MeetMe

 Let’s Chat

 Quick Chat

 Rafaqat (News)

 Chit Chat

The above-stated apps have now been removed from Google Play Store. (Image:Unsplash)

While the apps have been removed from the Play Store, here are the other apps that were available in the wild

YohooTalk

 TikTalk

 Hello Chat

 Nidus

 GlowChat

 Wave Chat

Also Read: Operation Triangulation To Xamalicious To Chameleon Trojan, Latest Threats Targeting iOS, Android Users; How To Be Safe

ESET researcher Lukas Stefanko noted that the impact of VajraSpy due to third-party app markets remains unknown due to the lack of download figures. As a precautionary measure, users must not download chat apps from links received from unknown people and monitor the permissions of apps on their devices.

Google shared a statement to BleepingComputer: “We take security and privacy claims against apps seriously, and if we…

Source…