BY ARMANDO OROZC, July 25, 2014
We hear a lot about the high amount of Android malware running rampant. An interesting tidbit is a vast majority of malware doesn’t need any special ‘magic’ to behave maliciously. They use existing functionality to attack users, functionality available to all developers.
We’ll take a look at a couple of these methods in which malware is able utilize, once their permission request is granted and the app is installed.
Read more
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.