SecurityWeek – (International) Building Android malware is trivial with available tools. Because of readily available tools that enable even a novice developer to create malicious mobile applications, users should be cautious when downloading and installing mobile apps, especially from non-official App Stores. Developing Android malware to harvest information is a trivial task and possible using readily available tools, a security architect and director at Kindsight Security Labs told SecurityWeek. He demonstrated how to inject snippets of code into a legitimate Android application that infected a mobile device with malware. When executed, the malware connected with a remote command-and-control center and transmitted data from the device.
Ali Loney is a Senior UX Designer at Walmart Labs. She is based in Canada and was the former Graphic Designer at Sonatype.
Explore All Posts by Ali LoneyTags