
Lookout believes Geinimi is capable of receiving commands from a central server, and it can collect and transmit user data. There is also the posibility that Geinimi might be setting up the infrastructure required for a botnetLookout also believes there is a possibility that Geinimi could be laying the groundwork for an Android botnet.
How do you protect yourself?
- Don't install apps from untrusted third-party application markets
- Don't enable Android's 'install from unknown sources' setting
- Install a free anti-malware
Via Download Squad
Image via Lookout Mobile Security
No comments:
Post a Comment