Nowadays various mobile gadgets become an important part of our daily life. I'm talking not only about various mobile phones but about various tablets and GPS/GLONASS navigators as well. Those devices are widely spread and I can't simply imagine a modern active man without a cell phone. Those devices make our far more convenient. But as you probably know any smartphone or tablet will be actually useful without a pack of various mobile applications. That's why the war between major mobile gadgets manufacturers becomes a war between ecosystems that will work to make your mobile gadget really useful.

Mobile Phones And Tablets

>We are sure that mobile applications are widening the sphere of the device's use and so you'll be able to use the gadget for more various tasks. But you should remember that not all apps are equally useful, some of them may be really dangerous. That's why we at decided to make this small article on various malicious mobile applications. Here we will tell you about what harm they can make and how to protect yourself from them. And as long Android OS is considered to be the most widely spread we will focus on it.


First of all you should know that most of those mobile viruses are created to send SMS messages and dial short numbers with high tariffication, filling the pockets of its makers. That malware is often disguised, it hides in various popular mobile apps, like Angry Birds or others. They give you the chance to install those apps for free and without ads, but be wary, they are probably infected! Those apps are widely spread in Android OS. While Android OS is considered to be the safest mobile operational system. The biggest security gap of that mobile OS is the user himself. You should know that as long as Android is a Linux-based every application will require user's permissions. All the other activity is restricted, until the user will grant those permissions.

Android Logo

But users rarely pay attention to those and simply grant them, which leads to rather sad consequences like stolen money or private information. So check those permissions, for sending SMS or dialing phone numbers an app will ask for services that cost you money, sending SMS and dialing phone numbers. Another class of those dangerous mobile apps are applications that can track user's coordinates and send them to third parties. They are far more rare in comparison with others, but far more dangerous. Also they have a couple of requirements for the platform, so they won't run on just any device. First of all they will need a GPS or GLONASS receiver on a smartphone or tablet and mobile Internet connection. That type of malware will ask for three permissions: precise location from GPS, coarse location from cell towers and Wi-Fi networks and unlimited Internet access to share the gathered data.


And if it's pretty clear how GPS positioning works, cell tower and Wi-Fi navigation is not at all. Navigation on cell phone towers is called a cell phone tower triangulation. In that case your coordinates are calculated between three closest base stations depending on the signal power. Wi-Fi navigation works pretty the same, but it uses wireless networks as beacons. We have to admit that both of those methods are not as accurate as GPS, but they work indoors. The main problem here is that you can turn off GPS module to avoid GPS tracking, but you can't avoid cell tower triangulation without a cell phone signal blocker.

Android App Permissions

Now a couple of words about protection. Those permissions, we were talking about are granted when an app is being installed, but you can check them for all the apps you have already installed at any moment. Simply access “Settings” menu, then go to “Applications”. There you can press “Permissions” button to see the permission granted to the application you have selected. There you can no only view them, but also you can cancel them.


So don't forget to check them. If you see that a game or some “live” wallpapers ask for unlimited Internet access, or sending messages – it is a serious reason to avoid them. We can assure you that the right permissions policy will probably protect you from most of mobile viruses.