Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let a Malicious Application Undermine Your Mobile Security

Don’t Let a Malicious Application Undermine Your Mobile Security

While you’ll probably hear us recommend that you update as soon as possible at every opportunity, the source of these updates is important to consider. This is especially the case now that mobile security firm Zimperium has discovered a new mobile spyware that pretends to update your mobile device… but actually steals data and monitors the user’s search history and location.

Called “System Update,” many Android users have already fallen victim.

What “System Update” Does

The Remote Access Trojan (or RAT) that powers this spyware isn’t available through the Google Play store. This means that this message/contact/device info/browser bookmark/search history/microphone and camera access-stealing application isn’t available to most users.

However, should a user download it, the app could continuously track their location with the application kicking into effect whenever new information is sent to the device. The app then covers its tracks once your data is stolen, making it something that should not be taken lightly.

How is System Update Being Spread?

Perhaps unsurprisingly, phishing has proven to be an effective means for the System Update application to be spread. Despite repeated warnings from Google to never install applications from outside the official Google Play Store, many—especially those with aging devices—seek out new apps and options from other, far less trustworthy sources.

How to Protect Yourself

First, don’t download applications from outside of the Google Play Store. While some malicious apps have snuck past the review process to appear on its pages, this is a very rare occurrence. Question every attempt made to send you to another source of a download, erring on the side of avoidance.

Total Tech Care can help your business do even more to protect your business from these kinds of threats, providing and using tools like mobile device management (MDM) and a Bring Your Own Device (BYOD) policy. Give us a call today to learn more at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Upgrade Managed IT Services Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Cloud Computing Office Data Recovery Passwords Windows 10 Gadgets Social Media Tech Term Chrome Virtualization Saving Money Holiday Automation Managed Service Microsoft Office Managed IT Services Facebook Artificial Intelligence Operating System Cybercrime Computers Networking IT Support Wi-Fi Hacking Health BYOD Internet of Things Mobile Device Management Alert Information Information Technology Managed Service Provider Remote Spam Office 365 Covid-19 Telephone Systems Social Engineering Mobility Employer-Employee Relationship Recovery Router BDR Bandwidth App History Password Data Breach Big Data Money Human Resources Encryption Applications Mobile Computing Remote Monitoring Law Enforcement Application Office Tips Training Managed IT VPN Apps Remote Computing How To Mobile Office Government Blockchain Private Cloud Data Storage Paperless Office Patch Management Vulnerability Wireless Windows 7 Word Bring Your Own Device Data Management Work/Life Balance Gmail Infrastructure Voice over Internet Protocol Servers Settings Two-factor Authentication Flexibility Data Security Google Drive Marketing Mouse HaaS WiFi IT solutions Entertainment Website Avoiding Downtime Budget Save Time Employee/Employer Relationship Machine Learning Scam RMM Connectivity Remote Work The Internet of Things Lithium-ion battery Cleaning Vendor Management Firewall End of Support Education Physical Security Virtual Reality Safety Apple Data Protection HIPAA Sports Redundancy Social Keyboard User Error Vendor Meetings USB Managed Services Display Risk Management Staff Software as a Service Hacker Telephone System Conferencing Hard Drive Humor Business Intelligence Data storage Update DDoS Automobile Audit Worker Computing IT Management SharePoint Google Docs Botnet Computing Infrastructure Identity Theft IT Plan Going Green Customer Service Environment Unsupported Software Digital Signage Fax Server Augmented Reality Battery Charger Fraud Shadow IT Virus Legal SaaS Compliance Remote Worker Procurement Unified Threat Management OneNote Computer Care Internet Exlporer Workplace Strategy Computer Accessories Net Neutrality Cryptocurrency Current Events Telephony Help Desk PDF Network Congestion Samsung Printing eWaste Comparison Value Proactive IT CES Printer Spam Blocking Electronic Medical Records Bluetooth Best Practice Managed Services Provider YouTube Content Management Black Market Database Business Technology Wearable Technology Access Control Retail Hiring/Firing Hard Drives Remote Workers Instant Messaging Robot Excel Virtual Assistant Processor Document Management Authentication IT Consultant Solid State Drive Wireless Technology Biometrics Downtime Virtual Desktop How to Tools Project Management Nanotechnology Files Telecommuting Peripheral Digital Security Cameras Using Data Television Cortana Chromecast Digital Signature Science Copiers 5G Warranty Colocation Uninterrupted Power Supply Quick Tip Ergonomics Consultant Smartwatch HVAC Public Computer Google Apps Analysis Monitor Customer Relationship Management Transportation Development Analytics Regulations OLED Distributed Denial of Service Virtual Machine Administrator Computer Fan Devices Rootkit Analyitcs PCI DSS 2FA Best Available Fiber Optics Employee Enterprise Content Management Programming Workers Accountants Reputation Benefits WIndows 7 Streaming Media Messaging Cabling MSP Hypervisor Microchip Content FENG Thought Leadership Credit Cards Tech Support Policy Dark mode Trend Micro Password Management Techology Antivirus IBM Password Manager Laptop Customers Smart Technology Multi-Factor Security Windows 8 SMS Flash Default App Saving Time Search Engine Audiobook Twitter IT service Procedure dark theme Shopping Software Tips Google Search NIST Supercomputer Business Mangement Touchpad Emails Smart Tech User Trending Tablet AI PowerPoint Sync IT Infrastructure Windows Media Player Politics Bing Addiction Advertising Domains Amazon FinTech Social Network Recycling Wiring IaaS Netflix Practices Maintenance Two Factor Authentication Managing Stress Notifications Investment Employee/Employer Relationships Root Cause Analysis Cache Amazon Web Services Bloatware Employees Criminal Music Windows 365 Cameras HBO ISP Safe Mode Knowledge GDPR Hosted Computing Relocation Tablets Video Conferencing Skype ROI Bitcoin Data loss Shortcuts Wireless Internet Online Shopping Entrepreneur Sales Troubleshooting Point of Sale Personal Outlook Cryptomining File Sharing Video Games Leadership Camera Worker Commute Inventory Shortcut Specifications Supply Chain Management Start Menu Batteries Experience Screen Mirroring Wire Loyalty Evernote Cost Management Monitoring Social Networking Books Windows 8.1 Travel Digitize Printer Server Frequently Asked Questions Scalability Printers Business Owner Windows 10s Millennials Mobile Windows Server 2008 R2 Customer relationships Cast Smart Office Wireless Charging NarrowBand Emergency Email Best Practices IT Assessment Tip of the week Manufacturing Search Running Cable webinar Virtual Private Network Public Cloud iPhone Employer Employee Relationship Workforce Memory Professional Services Computer Tips Managed IT Service Security Cameras Assessment Cables Virtual CIO OneDrive Windows Server 2008 Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code