technology

everything you need to know about malware and how to protect

 

rootkit, control your device and get your data – mining-software, steal your power to mine crypto currency – trojan, install other malware, to send spam from your device or steal information like passwords

 

only 14% of businesses have implemented even the most basic cybersecurity practices

 

 

the signs are clear that mobile threats can no longer be ignored

 

 

a combination of vulnerability management, anomaly detection, behavioral profiling, intrusion prevention and transport security technologies to protect mobile devices and applications from advanced threats

 

 

general

ai to secure appstore

google created a news technique to prevent “bad” apps to be published via play store @engadget

the company took down over 700,000 apps that violated play stores policies last year (a 70 percent increase over 2016)

 

google_play_protect

google play protect is already a service to protect android, it is built into every device with google play

apple user are save as well, if they use the apple appstore, there are also just scanned apps approved

google‘s last years app store growth or enterprise protection services @appstore recap