Apps in the App Store and Google Play are available in millions of applications. Users actively use many applications from banking to social media.
The authorizations when downloading the applications enable applications to use many data and functions on the device.
Although the permissions granted are a prerequisite for the operation of the applications, checking these authorizations increases the safety of the users. Unconscious authorizations for downloaded applications bring in some risks.
In addition to reliable applications, there are many malicious applications in the application transactions. Fraudsters can record their personal data by these applications, cause financial losses to experience financial losses and send unwanted messages to their leaders.
Therefore, users have to pay attention to which applications they download and what permission they give.
The consistency between the application and the authorizations should be checked
Applications can access many data from the user to the camera, from microphone to photos. These access authorizations are presented to the user's approval when the application is downloaded for the first time. Users can manage these permits after downloading the application in the Settings menu.
Cyber fraudsters generally demand permissions that are not necessary for the use of the application. For example, access to the user's location can be requested for an application for which no location data is required. At this point, users must check the consistency between application and permissions.
It is also important to download applications from reliable sources, to examine the developer information and to view user comments.
In addition, it is recommended not to install applications on the phone, except for the official application business. If you use the operating system up to date and the use of reliable antivirus software, you can also reduce the risks.
Millions of users were the goal of malicious applications
Although the harmful applications in the application transactions are removed after recognition, it can remain open for a long time.
For example, the 331 malicious application in Google Play reached 60 million downloads last month.
From health tracking via the QR browser, from the note tool to battery optimization, users have become the goal of cyber fraud through these applications.
Google closed the report on more than 158,000 malignant developers who tried to publish harmful applications on Google Play last year and prevented the publication of more than 2 million applications that violated the rules.
On the other hand, applications and permissions have unconsciously downloaded and enables the power of the device and cyber security to be disadvantageous. Applications that constantly follow the location and carry out data exchange in the background can slow down the device and reduce the battery life.
Applications that use unnecessary data can cause the user to quickly consume the contingent by increasing internet use.

Bir yanıt yazın