The multinational Google excluded 17 apps from the Play Store that had malware responsible for capturing screens, stealing passwords and PINs and bank details, worrying users android around the world. With that in mind, we have listed tips to avoid using applications with malware that can result in the data leak on your device.
Read more: See 4 tips for better ironing
see more
Google develops AI tool to help journalists in…
Unopened original 2007 iPhone sells for nearly $200,000; know...
Now check out some tips to avoid having your personal data invaded by malicious apps:
1. Download apps from the Play Store platform.
While it's nearly impossible to guarantee that every app is safe, the Play Store is the store of official applications of the Android system and usually undergoes security operations periodically. In this way, corrupted applications are more commonly inspected and deleted from the platform. With that in mind, always choose to download them directly from the Play Store, not from unknown sites.
2. Avoid apps from unknown developers.
App developer companies can easily be found on Google or your preferred search engine. We recommend that you choose to download applications that are from well-known companies and reliable or, if not possible, read comments from the developer in question before carrying out the download.
3. Don't download apps with low total install numbers.
Apps that have been installed infrequently tend to have low ratings and therefore little security check of device data. They can also be developed by less secure companies. That said, preferably opt for apps that have already been tested and improved.
4. Always read user rating comments.
Applications must be constantly updated, responding to requests and complaints from users who often leave their impressions in the virtual store's comments. That way, always read the reviews of the app you want to download. There, you will be able to assess whether the errors and “bugs” have been corrected and whether there has already been a security breach, and thus you will be able to judge whether or not you should download it.