Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:00 PM
Dark Reading
Dark Reading
Products and Releases

Security Researchers Discover Over 2.3 Million New Android Malware Samples in 2015

G DATA Releases Mobile Malware Report for the Fourth Quarter of 2015

Atlanta, GA – February 24, 2016 – Today, global security firm, G DATA, released its Q4 2015 Mobile Malware Report which found that the number of new malware instances rose to a record high of over 2.3 million in 2015. During the same timeframe, almost 40 percent of U.S. smartphone users used an Android device. Additionally, the report found that the number of new Android malware apps increased by almost 50 percent compared to 2014. G DATA experts expect a further increase in mobile malware in 2016. One reason for this is that more and more users are using their mobile devices for online banking and shopping as an alternative to the desktop PC.

“With the increase in mobile usage for sensitive transactions such as banking and shopping, the increase in mobile malware instances as well as malware apps is particularly alarming,” said Andy Hayter, security evangelist, G DATA. “The attack surface just continues to grow, and hackers are taking advantage. Users have to be more and more vigilant every day to protect themselves from becoming the next victim.”

G DATA security experts identified 758,133 new Android malware files in the fourth quarter of 2015. That is an increase of almost 32 percent compared to the third quarter (574,706). Hence 2015 attained another negative record, with a total of 2,333,777 new malware programs for the Android operating system.

G DATA forecasts for 2016

■      Evolution in Android malware: Cyber criminals have spotted the potential for high financial gain in the Android operating system. The switch from PCs to mobile devices will continue in 2016. For this reason, experts expect a further significant increase in malware figures.

■      The Internet of Things in cyber criminals' sights: Connected vehicles, fitness wristbands and networks – the Internet of Things is becoming more and more popular, within our homes as well as at work. Criminals are stepping up their activities in this area and are specifically looking for security holes in order to exploit them. Numerous end devices are controlled via Android apps. The experts expect the threat to increase in 2016.


The G DATA Mobile Malware Report is available online at https://secure.gd/dl-us-mmwr201504


About G DATA

IT security was invented in Germany: G DATA Software AG is the antivirus pioneer. It was more than 28 years ago that the company, founded in Bochum in 1985, developed the first program to combat computer viruses. These days, G DATA is one of the world's leading providers of IT security solutions.

Test results prove that IT security "Made in Germany" offers Internet users the best possible protection. Stiftung Warentest has been testing Internet security products since 2005. In all seven tests performed between 2005 and 2014, G DATA achieved the best virus detection rate. In comparative tests by AV-TEST, G DATA regularly demonstrates the best results in the detection of computer malware. Internationally, G DATA INTERNET SECURITY has also been awarded best Internet security package by independent consumer magazines – in countries such as Australia, Austria, Belgium, France, Italy, the Netherlands, Spain and the USA.


The product range comprises security solutions for end customers as well as medium to large-sized enterprises. G DATA security solutions are available in more than 90 countries worldwide.


For more information about the company and G DATA security solutions, see www.gdata-software.com 



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-23
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse...
PUBLISHED: 2021-04-23
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after t...
PUBLISHED: 2021-04-23
Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 through 4.6.3 allows remote attackers to access project sources via crafted HTTP request.
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has cleartext passwords stored in the conf/admin.password file. A regular local user is able to read usernames and passwords.
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application server configuration.