#parent | #kids | New Malware Infects Children’s Android Apps / Digital Information World

Protecting your children is definitely going to be a high priority for you and a big part of the reason why that is the case has to do with the fact that your children are going to be using the internet where they would be exposed to all kinds of dangerous activities that they would not know to stay away from all in all. At the end of the day you want your kids to be able to use the internet but you would need to be wary of the various apps that they are using.There is a new clicker malware going around called Tekya which involves a lot of different kinds of malicious forms of behaviors that are all infecting apps that are aimed at children. Check Point’s researchers recently analyzed a set of 56 infected apps that were downloaded nearly 1 million times globalbly, two dozen of them are targeting children and as a result of the fact that this is the case you might want to be careful.

The way this malware works is that it will make children want to click on the ads by enticing them with something or the other that they don’t really know they should be avoiding all in all. The malware click generator is made up by using motion detection technology turning motions and gestures that are not associated with the ads into clicks that would generate revenue for the people that have added this malware to the app in the first place.

“The Tekya malware obfuscates native code to avoid detection by Google Play Protect and utilizes the ‘MotionEvent’ mechanism in Android to imitate the user’s actions and generate clicks.”

Android apps get infected with malware quite frequently and the reason behind this is that they are not as secure as apps that are offered by other service providers. Hence, you need to make sure that the apps your kids are using are not infected with any kind of malware and being proactive about this is definitely going to help quite a bit.

Read next: How Safe Are Google’s Android Auto and Apple’s Car Play?


Source link
.