Hmm - on second thoughts, maybe shouldn't post that link ( send a pm if interested ). Įxample : credential-less command executionĪnd remote privilege escalation on Linux has been successfully demonstrated in earlier cases :. īut nasty stuff targeting LInux is definitely out there, no mistake about that. via Registry changes and privilege escalation ). Of course, the very nature of GNU/Linux systems makes it much more difficult for malware to actually do anything useful/destructive ,Ĭompared to the almost limitless potential for causing havoc on Windows systems ( eg. the majority of servers ) but designed to infect MS users ( one of the few sensible uses of ClamAV etc.) Most of what I see is either of the proof-of-concept variety ,and I can't find any well-documented real-world infections , Well I, for one, am concerned about it, and I keep a constant weather-eye on the situation. What strikes me as odd is that there is linux malware out there yet not many, if any, of the regulars are actually concerned by it. It goes without saying, apply contemporary and best security practices with a healthy serving of common sense and you should be okay. Linux doesn't know how to interpret machine code designed to run on Windows, unless of course, you have WINE installed on the host or the shared directory is used by an application on the host that is capable of interpreting and executing machine code in that shared directory. The file will run under Windows but won't get that far in the host. Say, you downloaded some random EXE, MSI, what-have-you Windows executable to the shared directory. And even though you shared a directory between the host and the VM, chances are there is no significant effect on the host since the malware only targeted your Windows guest. Also, as long as the host machine's directories are not exposed to the VM, you should be fine. Since you browse the web using whatever browser you use in the Windows guest, any infection only affects the guest. This prevents any app that wasn't obtained from Google Play Store from being installed (which could include malicious apps that are inadvertently downloaded).Happens inside a virtual machine, stays within the confines of the virtual machine. Turn off "Unknown Sources" in Settings>Security (or in Special App Access on newer phones). This allows Google to periodically scan your phone's apps to look for malware.ĥ. Turn on Google Play Protect features in Settings>Google>Security (or in the Play Store settings). Read a bunch of app reviews before installing an app to look for any complaints about adware or suspected malware.Ĥ. Only install apps from well-established app sources like Google Play Store or Amazon Appstore. Never ever tap on a link that appears in a popup while browsing, especially if they're warning you that your phone is infected - they're just trying to scare you into installing some bogus "antivirus" app that is probably malicious itself.ģ. Avoid shady websites that deal with things like porn, gambling, and "free" (aka pirated) apps/music/movies.Ģ. Here's my spiel about the need for antivirus apps on Android:įor the most part, it's still quite difficult to get an actual virus on your phone, because malware requires you to manually accept the installation (which is why they try to fool you into thinking you're installing something legitimate). I would avoid Avast or AVG, since they were in the news recently for selling customer data: Welcome to Android Central! I moved this from the Android Apps forum to the Android Antivirus forum since the former is intended for developers to promote their apps.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |