Google has just published this urgent warning to all Android users

A newly discovered security threat could give informed access of hackers to your phone.


For Most, Keeping Your Smartphone Safe Typically Means Not Leaving IT UnsuperVised in Public Or Locking It With A Passcode. After All, Your Phone's Access to Everything from yourStored Personal Data forBank accounts Makes IT has specially sensitive piece of equipment. Purpose IF You're An Android User, You May Want to Take Extra Deposit in Light Of A Recently Discovered Security Threat. READ ON TO SEE WHAT COULD BE PUTTING YOUR DEVICE IN DANGER.

RELATED:IF You Have An Android, You'll Be Barred from Doing This Starting Today.

Dangerous New Malware Program Called Octo Give Hackers Complete Control of Android Phones.

A woman using an Android smartphone while a male colleague watches over her shoulder
Shutterstock

In a recent blog post, financial cybersecurity firm threatfabric Announced that it had discovered a dangerous new piece ofMalware That Targets Android Phones. The Latest version of "Octo," A notorious Banking Malware Program That Can Give Hackers Complete Control Over Devices That Accidentally Install IT-Including Access to Your Personal Information and Financial Accounts,The U.S. Sun reports.

THE PROGRAM CAN RUN IN THE BACKGROUND WHILE MAKING YOUR PHONE APPEAR INACTIVE OR SWITCHED OFF.

woman using android phone from behind
Shutterstock

Accordinging to Threatfabric, Octo Is the Latest Evolution in A Series of Programs KNOWN AS Remote Access Trojans (rats) Available to Criminals on The Dark Web. After Unsuspecting Victims Download The Malware, IT Can Secretly Run in the Background ToMINE INFORMATION AND EVEN COMMIT FRAUD. The Program Also Allows Hackers to Control Volume, Push Notifications, and Screen Brightness, Which Makes The Phone's Display Appear Black Gold Switched Off So The Can Access The Device Uninterruptd.

Similar to other malware, Octo Also Includes a Keylogger for Lifting Personal Data and Passwords, The Ability to Intercept and Send Text Messages, The Ability to Launch Applications, and Control Over The Home Screen Lock.

RELATED:For more information up to date, sign up for our daily newsletter.

BE WARY OF UNTRUSTWORTHY WEBSITES, Browser Update Notifications, OR APP Update Requests.

Hacker on a Computer How Scammers Work
Shutterstock

The Experts Warn That The Program Spreads by Using AGold Landing Website That produces a phony browser or Software Update Request. However, The Software Has Even Been Included in Apps That Were Previously Available On Google's Official Download Marketplace.AE0FCC31AE342FD3A1346EBB1F342FCB

"ExobotCompact / Octo Has Dangerous Capabilities, Powered by Inventive Distribution Schemes Including Droppers on Official Google Play Store and Malicious Landing Pages," Threatfabric Wrote. "Thus, Customers are Very Likely to Fall Into Installation The Malware on Their Devices, Allowing The Actors to Have Remote Access to Their Devices and Terefore to Their Banking Accounts."

AvoidInfecting Your Phone With Octo Or Other Malware, It's Always Best To Be Careful About Which Apps and Programs You Install On Your Devices, Tech Blog Tom's Guide Reports. And Although You Should Always Stick to Reputable Download Sources, Even Official App Markets Can Sometimes Miss Hidden Malicious Codes in Programs. To Stay Ahead of Any Threats, Consider Turning On Play Protect by Tapping Your Profile Icon Next To The Search Bar and Clicking The Gear Icon on Your Device. From THERE, make sure the "Scan Apps with Play Protect" and "Improve Harmful Dev Detection" options are Switched on.

Experts Have Recently Discovered Other Major Security Vulnerabilities in Android Devices.

A young man using an Android phone in a coffee shop
Shutterstock

This isn't The Only Major Security Vulnerability Recently Discovered for Android Products. In a blog post from april 1, Cyber ​​Security Research Group Lab52 Issued A Warning That IT Had Discovered AMALICIOUS PIECE OF SOFTWARE Capable of infecting the smartphones. The Program, KNOWN AS "Process Manager," Can Sneakily Be Downloaded On Devices and Then Used ToSend Personal Information to Hackers.

According to Lab52, Users Usually Download The App Accidentally After Clicking On A Link They've Received Through A Text Message Or Email On Their Device. From There, The Malware Will Display A phony Warning Message That Grants ITAccess to the Phone's Camera and Microphone And Allows It To Read Text Messages, Emails, Call Logs, Contact Information, and the Device's Exact Rental. The App Will Then Continue to Run in the Background to Gather Information That Can Be Fey Back to Hackers and Used To Exploit BlackMail Victims,The U.S. Sun reports.

To make sure your phone is free from spyware, experts recommend a double verification that applications have permission to access the camera, microphone and messages on your device. You can do it by pressing the settings, then search for "Apps" or "Applications and Notifications" before clicking "Permissions". If programs that you do not recognize have access to your device, revoke them immediately.

RELATED: Apple has just published this major warning for all iPhone and iPad users .


The rock has just posted the cutest photo of Him at 7
The rock has just posted the cutest photo of Him at 7
40 quotes from an inspiring new year to start your year of deactivation
40 quotes from an inspiring new year to start your year of deactivation
6 subtle signs you need to replace your hand disinfectant
6 subtle signs you need to replace your hand disinfectant