Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let a Malicious Application Undermine Your Mobile Security

Don’t Let a Malicious Application Undermine Your Mobile Security

While you’ll probably hear us recommend that you update as soon as possible at every opportunity, the source of these updates is important to consider. This is especially the case now that mobile security firm Zimperium has discovered a new mobile spyware that pretends to update your mobile device… but actually steals data and monitors the user’s search history and location.

Called “System Update,” many Android users have already fallen victim.

What “System Update” Does

The Remote Access Trojan (or RAT) that powers this spyware isn’t available through the Google Play store. This means that this message/contact/device info/browser bookmark/search history/microphone and camera access-stealing application isn’t available to most users.

However, should a user download it, the app could continuously track their location with the application kicking into effect whenever new information is sent to the device. The app then covers its tracks once your data is stolen, making it something that should not be taken lightly.

How is System Update Being Spread?

Perhaps unsurprisingly, phishing has proven to be an effective means for the System Update application to be spread. Despite repeated warnings from Google to never install applications from outside the official Google Play Store, many—especially those with aging devices—seek out new apps and options from other, far less trustworthy sources.

How to Protect Yourself

First, don’t download applications from outside of the Google Play Store. While some malicious apps have snuck past the review process to appear on its pages, this is a very rare occurrence. Question every attempt made to send you to another source of a download, erring on the side of avoidance.

Total Tech Care can help your business do even more to protect your business from these kinds of threats, providing and using tools like mobile device management (MDM) and a Bring Your Own Device (BYOD) policy. Give us a call today to learn more at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Gadgets Virtualization Saving Money Holiday Social Media Tech Term Managed IT Services Microsoft Office Managed Service Automation Operating System Artificial Intelligence Computers Facebook Cybercrime Internet of Things Hacking Wi-Fi BYOD Mobile Device Management Networking IT Support Health Covid-19 Spam Alert Office 365 Telephone Systems Information Information Technology Remote Managed Service Provider BDR Social Engineering Mobility Bandwidth Recovery Employer-Employee Relationship Router Big Data Law Enforcement Data Breach Remote Monitoring Mobile Computing Password Money App History Application Encryption Applications Human Resources Remote Computing Private Cloud Mobile Office Managed IT Blockchain Paperless Office Apps How To Office Tips Training VPN Data Storage Patch Management Government Servers Mouse HaaS Flexibility Bring Your Own Device Marketing Data Security Data Management Work/Life Balance WiFi IT solutions Entertainment Website Wireless Budget Infrastructure Gmail Voice over Internet Protocol Google Drive Settings Vulnerability Windows 7 Word Two-factor Authentication Avoiding Downtime Apple Social Vendor Management Employee/Employer Relationship User Error Save Time RMM Meetings Cleaning Staff Software as a Service Telephone System Risk Management Machine Learning Hacker Connectivity Remote Work USB End of Support The Internet of Things Education Physical Security Lithium-ion battery Safety Sports HIPAA Conferencing Redundancy Firewall Keyboard Vendor Scam Managed Services Display Virtual Reality Data Protection Botnet Processor IT Plan Network Congestion Comparison eWaste Document Management Wireless Technology Hard Drive Unsupported Software Solid State Drive CES How to Downtime Virus Charger Content Management Unified Threat Management Business Technology Computing Access Control Data storage Compliance Computer Accessories Wearable Technology Automobile OneNote Computer Care Current Events Hard Drives Virtual Assistant Retail Telephony Authentication Instant Messaging Robot Computing Infrastructure Samsung Excel Going Green Digital Signage Biometrics Printer Bluetooth Virtual Desktop Value Update Battery Spam Blocking Electronic Medical Records Shadow IT DDoS Legal Google Docs Procurement SharePoint Net Neutrality Hiring/Firing Identity Theft Workplace Strategy Internet Exlporer IT Consultant Help Desk Printing Humor Customer Service PDF Environment Augmented Reality Fraud Proactive IT Managed Services Provider Business Intelligence Fax Server Remote Worker Database Audit Worker Best Practice YouTube SaaS IT Management Cryptocurrency Black Market Remote Workers IT Assessment Business Owner Manufacturing Computer Fan Cache Rootkit Amazon Web Services WIndows 7 Email Best Practices NarrowBand IaaS Safe Mode Maintenance Criminal Search Security Cameras Workers Hosted Computing Bloatware Benefits Computer Tips Managed IT Service GDPR OneDrive Biometric Security FENG Wireless Internet iPhone Online Shopping Virtual CIO Tablets Peripheral File Sharing IBM Flash Camera Inventory Entrepreneur Smart Technology Specifications Digital Security Cameras Using Data PowerPoint Copiers Windows Media Player 5G Wire Files Evernote User Supercomputer Chromecast Travel Quick Tip Software Tips Shortcut Sync Printers Smartwatch Emails Cost Management Millennials Ergonomics Development OLED Smart Office Social Networking Colocation Wireless Charging Uninterrupted Power Supply Managing Stress PCI DSS Virtual Machine Fiber Optics Virtual Private Network Employee Netflix Monitor Two Factor Authentication Workforce 2FA Cameras Messaging Running Cable Cabling Root Cause Analysis Cables Knowledge Memory Music Policy Hypervisor HBO Trend Micro Skype Project Management Nanotechnology Reputation Telecommuting Streaming Media Dark mode SMS Content Default App Data loss Cortana Tech Support Techology Leadership Digital Signature Laptop Troubleshooting Procedure Saving Time Outlook Printer Server Shopping Start Menu Warranty Google Search Customers dark theme Science AI Audiobook IT Infrastructure Screen Mirroring HVAC Loyalty Google Apps Bing Analysis Touchpad Books FinTech Frequently Asked Questions Social Network Mobile Administrator Windows 10s Devices Distributed Denial of Service Politics Investment Cast Enterprise Content Management Customer Relationship Management Advertising webinar Accountants Analyitcs Emergency Employees Employee/Employer Relationships Tip of the week MSP Professional Services Microchip ISP Public Cloud Thought Leadership Programming Employer Employee Relationship Credit Cards Notifications Windows 365 Video Conferencing ROI Password Management Assessment Password Manager Shortcuts Multi-Factor Security Sales Bitcoin Windows Server 2008 Personal Tools Search Engine Antivirus Cryptomining Twitter Relocation Point of Sale Windows 8 Supply Chain Management NIST Television Business Mangement IT service Video Games Smart Tech Trending Consultant Monitoring Batteries Analytics Digitize Worker Commute Addiction Amazon Windows 8.1 Tablet Experience Windows Server 2008 R2 Public Computer Recycling Domains Scalability Practices Transportation Best Available Customer relationships Regulations Wiring

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code