成人免费xxxxx在线视频软件_久久精品久久久_亚洲国产精品久久久_天天色天天色_亚洲人成一区_欧美一级欧美三级在线观看

調查稱中國本土Android應用商店安全隱患問題嚴重

企業動態
谷歌Android Market目前還沒有在中國開業,于是不少中國運營商、手機制造商和第三方公司就爭先打造了自己的“Android Market”版應用商店。

谷歌Android Market目前還沒有在中國開業,于是不少中國運營商、手機制造商和第三方公司就爭先打造了自己的“Android Market”版應用商店。雖然這一結果確實給大量的中國用戶帶來了更多選擇,但也存在不少安全隱患的問題。

[[18992]]


Android-china

Android平臺在中國市場擁有巨大的發展潛力,如果這一平臺能夠綁定Android Market出擊中國市場,那么一定能夠造福許多希望進軍中國的開發商。但在此之前,Android平臺還面臨許多需要克服的問題。據游戲邦了解,Lookout Mobile Security公司最近針對中國的Andrid應用市場進行了調查,發現其中的兩大應用商店雖然支持合法的漢化版應用,但同時也提供盜版和重新包裝的產品。

Android-china

Android-china

Android-china

Android-china

調查發現,在這些應用商店中,61%的產品是漢化版的特殊手機應用,有11%的應用存在重新包裝的痕跡,或者是由非原創開發商發布的產品。

Lookout聯合創始人Kevin Mahaffey指出,只要有人從谷歌Andorid Market下載了一款應用,產品就已存在被重新包裝的可能。這些第三方開發者有可能更改原始應用的代碼,然后將其投放到本土Android應用商店中。他們可能在原始應用中植入惡意軟件,也有可能嵌入自己的廣告代碼,然后這些廣告收益就流向了這些不法開發者的手中,原始開發商卻無法分得一杯羹。

游戲獲悉,在這些重新包裝的產品中,有些產品向用戶彈出請求對話框的頻率比原始應用更高(游戲邦注:Andorid應用一般都會向手機用戶發出相關授權請求,比如說獲取用戶的聯系人列表等信息),被安插的惡意軟件的應用更是如此。

iOS-china-apps

除此之外,中國本土的iOS應用商店也存在不少盜版問題,這一市場上85%的應用都屬于這種類型。手機用戶經常會通過越獄,或者繞過蘋果應用審核程序,從這些第三方iOS應用商店中下載內容。調查發現,在其中的一個第三方應用商店中,約有8%(或者說2000款應用)的產品盜版了蘋果App Store的同款應用。

據游戲邦了解,Lookout還發現約三分之一(34%)的App Store免費應用,以及28%的Android Market免費產品,可以獲取用戶所在地理位置。還有7.5%的Android免費應用和11%的蘋果同類產品可以獲取用戶的聯系人信息。

與此同時,該調查還指出在過去6個月中,可獲取用戶地理位置及聯系人信息的手機應用數量已經呈現下降的趨勢。這一現象有可能與開發商普遍提高了保護用戶隱私的意識有關。

Lookout的調查還發現了一款名為HongTouTou的木馬應用程序(或稱為ADRD木馬),它在漢化版的重新包裝應用中最為普遍,該木馬目前存在于14種重新包裝游戲和墻紙應用中。(本文為游戲邦/gamerboom.com編譯,轉載請注明來源:游戲邦)

Google hasn’t opened an Android Market in China, so a number of Chinese carriers, phone makers, and independent companies have opened their own versions of the Android Market there. The result is a lot of app choices for Chinese users, but there are also more security risks.

Android has a lot of potential in the Chinese market. If the marketplace for apps can come together, then China could become a land of huge opportunities for app developers. But there are a lot of problems to fix still. That’s one of the conclusions I draw from the latest data from the App Genome Project, a massive study of apps undertaken by Lookout Mobile Security.

Lookout studied two alternative Android markets for Chinese users. While these markets serve a legitimate need for localized Chinese language apps, they also hosted pirated and repackaged apps.

Some 61 percent of the apps in these stores were unique, most likely because they were converted into the Chinese language. About 11 percent of the apps available on the markets were repackaged and likely submitted by someone other than the original developer.

Kevin Mahaffey, co-founder of Lookout, said in an interview that repackaging happens when someone downloads an app from Google’s Android Market. They can then inject their own code into the app and then upload it to an alternative Android Market. Sometimes they inject malware. Sometimes they inject their own ad code so that advertising dollars flow not to the original app maker but to the person repackaged the app.

Of the repackaged apps, a quarter request more permissions than the original app. (On Google Android phones, users are often prompted to give their permission for an app to access certain functions within the phone, such as accessing their contact lists). That’s ominous, considering malware often triggers permission requests.

Alternative app stores for Apple’s iOS (iPhone, iPad and iPod Touch) also exist. Lookout found that one of the markets existed mainly for pirates, as 85 percent of its apps were pirated. Users who “jail break” their phones, or circumvent Apple’s security software, can download pirated apps from these alternative stores. Roughly 8 percent of the paid apps in the Apple App Store, or nearly 20,000 apps, were found in pirated form on one alternative iOS market. That’s got to be depressing for app developers.

Lookout also found that about a third of the free apps in both the Apple App Store (34 percent) and the Android Market (28 percent) have the ability to access a user’s location. About 7.5 percent of free apps in the Android Market and 11 percent of free apps in the Apple App Store can access contact information.

That’s not alarming by itself, but it’s a potential red flag for privacy violations. Lookout found that there was some good news here, as the number of apps having access to location or contacts has fallen in the past six months. That may be due to more developer sophistication and a heightened awareness of privacy concerns after a big scare on the Android phones last summer.

Speaking of scares, Lookout identified a new trojan, HongTouTou, or the ADRD trojan, in popular repackaged apps targeted at Chinese-speaking users. The malware has 14 different versions so far repackaged in game and wallpaper apps.(source:venturebeat)

【編輯推薦】

  1. 我國下一代超級計算機2010年完成 將用八核龍芯
  2. 我國下一代超級計算機2010年完成 將用八核龍芯
  3. 我國下一代超級計算機2010年完成 將用八核龍芯
責任編輯:張攀 來源: 游戲幫
相關推薦

2011-02-07 13:17:36

Android MarAndroid應用商店

2025-01-09 13:50:12

2014-07-03 11:01:13

mongoDB安全隱患

2010-09-17 14:29:23

2012-06-25 09:18:36

2017-02-24 08:11:09

Docker數據安全容器

2009-07-06 13:38:02

2011-11-10 10:37:15

SAP云計算

2012-02-21 10:05:59

2014-08-27 14:26:29

國產操作系統

2024-01-26 16:16:48

InforERP

2019-07-23 08:56:46

IoT物聯網安全

2009-09-07 16:56:02

2016-09-29 22:09:26

2010-09-16 12:55:36

2015-04-22 09:57:54

2022-11-12 08:33:59

邊緣計算

2010-12-27 11:05:04

李開復

2009-03-17 09:48:00

2011-05-05 18:28:18

點贊
收藏

51CTO技術棧公眾號

主站蜘蛛池模板: 1区2区3区视频 | 久久久久久久av麻豆果冻 | 日本精品一区二区三区在线观看视频 | 国产做爰 | 亚洲精品电影 | 亚洲国产精品成人无久久精品 | 成人二区 | 99精品视频在线 | 精品一区二区三区免费视频 | 日韩中文字幕一区 | 精品丝袜在线 | 亚洲永久免费 | 免费精品 | 日韩一区二区久久 | 欧美三区在线观看 | 成人国产精品久久久 | av资源中文在线天堂 | 欧美亚洲在线 | 成人小视频在线观看 | 精品国产乱码久久久久久丨区2区 | 国产精品一区二区视频 | 欧美一级片在线看 | 免费久久99精品国产婷婷六月 | 欧美日韩一区不卡 | 国产精品一区二区三区在线播放 | 欧美日韩在线综合 | 欧美精品一二区 | 欧产日产国产精品v | 亚洲国产18 | 黄色av网站免费看 | 国产精品久久视频 | 91在线第一页 | 1级毛片| 欧州一区二区 | 欧美色成人| 特黄一级 | 99色在线视频 | 精品久久久久久亚洲综合网 | 蜜桃视频在线观看免费视频网站www | 日本又色又爽又黄又高潮 | 国产精品a久久久久 |