Protect Yourself: NITDA's Warning About Fake Google Play Store Apps

NITDA Warns Against Fake Google Play Store
Mrs Hadiza Umar, head of Corporate Affairs and External Relations at NITDA, made this known on Friday in Abuja.
According to Umar, the fraudulent website was disseminating the Play Praetor Trojan, a novel strain of malware.
According to Umar, the fraudulent website was disseminating the Play Praetor Trojan, a novel strain of malware.
Did you know? You can comment on this post! Just scroll down
"Cybercriminals are tricking victims into downloading malicious apps by creating fake websites that look like the Google Play Store," she claimed.
She clarified that a variety of social engineering techniques, such as phishing emails, malicious advertising, and SMS messages, were being used to spread the phony Play Store URLs.
Umar claims that the Play Praetor Trojan allows hackers to gain unauthorized access to the victim's device after the fraudulent application is loaded.
She clarified that a variety of social engineering techniques, such as phishing emails, malicious advertising, and SMS messages, were being used to spread the phony Play Store URLs.
Umar claims that the Play Praetor Trojan allows hackers to gain unauthorized access to the victim's device after the fraudulent application is loaded.
Data theft, credential harvesting, financial fraud, remote device control, and more malware distribution are all possible outcomes of this access, she cautioned.
She advised people to only download programs from reliable sources, such as the official Google Play Store.
In addition, Umar suggested that consumers check the makers of apps, read reviews before installing them, update their devices and apps frequently to fix bugs, and utilize trustworthy mobile security programs to identify and stop attacks.
She advised people to only download programs from reliable sources, such as the official Google Play Store.
In addition, Umar suggested that consumers check the makers of apps, read reviews before installing them, update their devices and apps frequently to fix bugs, and utilize trustworthy mobile security programs to identify and stop attacks.
Article Posted 8 Days ago. You can post your own articles and it will be published for free.
No Registration is required! But we review before publishing! Click here to get started