StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Evaluation of Source: Windows Malware tries to Infect Android devices Connected to PCs - Essay Example

Cite this document
Summary
Computer and mobile technology has continued to grow and it appears that the best is not yet to be. While technologists and experts are busy developing new products as well as innovating the preexisting ones, there are the malicious ones who have gone ahead to develop programs that have the capability to corrupt these systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Evaluation of Source: Windows Malware tries to Infect Android devices Connected to PCs
Read Text Preview

Extract of sample "Evaluation of Source: Windows Malware tries to Infect Android devices Connected to PCs"

Source Evaluation Source: “Windows Malware tries to Infect Android devices Connected to PCs” Computer and mobile technology has continued to grow and it appears that the best is not yet to be. While technologists and experts are busy developing new products as well as innovating the preexisting ones, there are the malicious ones who have gone ahead to develop programs that have the capability to corrupt these systems to the extent that they are destroyed. Development of viruses and malwares has been on the rise.

Through my research, I came across one article by Lucian Constantin that was posted in the Computerworld website. This article was posted on January 23, 2014; it features the discovery of a Windows Trojan program that infected Android devices connected to PCs by Symantec researchers. This article provides insight on various aspects that are mind opening and are verifiable. The article “Windows Malware tries to Infect Android devices Connected to PCs” is current, authentic and is backed up by research; therefore, it can be used for my research.

This source outstands from the rest in various aspects. Firstly, having been written in the year 2014, the article provides some of the most recent information about the malware technologies. Secondly, the article is presented in a form that is meant to attract professionals in this field. Otherwise, a layman may read the article but they may not fully understand the concepts and terms that have been used in the article. This sets the article apart from any other article related to such a topic, for example; “The Trojan program downloads the malicious APK, as well as the Android Debug Bridge (ADB) command line tool that allows users to execute commands on Android devices connected to a PC.

ADB is part of the official Android software development kit (SDK) (Constantin 1). Such a statement is very technical language; it requires an individual who is conversant with the field to understand what the author is up to. The authenticity of this article is enhanced by the research done by Symantec. This research gives the article the weight to be used in any research work. However, the information is not peer reviewed and cannot be used for scholarly works. The article features quotes from some of the researchers.

Flora Liu, one of the researchers at Symantec points out that, “interestingly, we recently came across something that works the other way round, a windows threat that attempts to infect android devices” (Constantin 1). In the quote Liu was pointing out that despite in the past having devices infect the PC, the scenario has changed, the malware is capable of infecting android PCs. In this article, the writer is very systematic in the approach that they use. She begins by giving a general overview of the discussion and the basis thereof.

She begins with a statement that is well aligned with the topic as well as the discussion topic. She then goes further to elaborate by providing resources including a blog post that one of the researchers, Flora Liu made some of the sentiments presented in the article. She goes on to explain more about Trojan.Droidpak and the mechanism in which it infects android devices from a PC. To affirm her statements she quotes Liu severally and concludes the article by mentioning the advice that Liu gave to users in order to prevent the threat.

This source provides very beneficial information in a very professional manner. It provides a stepwise description of the mechanisms behind the newly found malware. While it is not possible to use the source for scholarly work, it provides a very important background as well as providing some of the latest developments in the industry. Works Cited Constantin, Lucian. Windows malware tries to Infect Android Devices connected to PCs. Jan 23, 2014. Web. Feb 12, 2014. http://www.computerworld.

com/s/article/9245668/Windows_malware_tries_to_infect_Android_devices_connected_to_PCs?taxonomyId=125

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Evaluation of Source: Windows Malware tries to Infect Android devices Essay”, n.d.)
Evaluation of Source: Windows Malware tries to Infect Android devices Essay. Retrieved from https://studentshare.org/information-technology/1628540-evaluation-of-source-windows-malware-tries-to-infect-android-devices-connected-to-pcs
(Evaluation of Source: Windows Malware Tries to Infect Android Devices Essay)
Evaluation of Source: Windows Malware Tries to Infect Android Devices Essay. https://studentshare.org/information-technology/1628540-evaluation-of-source-windows-malware-tries-to-infect-android-devices-connected-to-pcs.
“Evaluation of Source: Windows Malware Tries to Infect Android Devices Essay”, n.d. https://studentshare.org/information-technology/1628540-evaluation-of-source-windows-malware-tries-to-infect-android-devices-connected-to-pcs.
  • Cited: 0 times

CHECK THESE SAMPLES OF Evaluation of Source: Windows Malware tries to Infect Android devices Connected to PCs

Malware in Operating Systems

Large numbers of operating systems are present in the market, namely Windows by Microsoft, Linux, android, and Apple Operating System (I.... For android, being the major player in this field and so successful at that, challenges for security are also growing in large proportion (Fedler et al 2012).... android OS Security risks and Limitations: Practical evaluation.... malware in Operating Systems: The computer is a set of various components out of which the most important one is the operating system....
3 Pages (750 words) Essay

Broader Description of Mobile Device OSs iOS, Android, Palm OS

In the initial phase, the applications required for the development of iOS is accumulated and encumbered to devices for multiple times to test functionality, designing efficiency and bug testing.... The next stages of AdHoc emphasizes on compiling the applications and installing it in the devices for further testing.... This paper ''Broader Description of Mobile Device OSs iOS, android, Palm OS'' tells that OS allows the users of the applications to interrelate with the hardware configurations of a computer system....
8 Pages (2000 words) Research Paper

Android Operating Systems

The introduction of smart phones and tablets have given a new dimension to the world of computing and thereby further expanded the market of digital devices with focus of customers on portable devices and their better services.... They designed the product with the motto of mobile devices that are smarter in their functionality and facilitate its users in terms of their choices and locations.... android Operating Systems: Introduction: Operating systems are the backbone to the computers that we have in front of us....
6 Pages (1500 words) Essay

How to Build an Android Application

Android is Linux based and was originally developed and designed for touch screen mobile devices such as smart phones and tablets but has since seen its application expand to other… In October 2003, Rich Miner, Andy Rubin, Chris White and Nick Sears founded Android Inc which was later acquired by Google in August 2005.... It enables Bluetooth tethering which allowed more devices share network connections.... android Unveiled was later formed by OHA in November 2007 after which android 1....
6 Pages (1500 words) Essay

Android and Linux Kennel Design Kind of System

On that note, this operating system is intended for use in touch screen devices for instance smart phone and tablets.... Incidentally, the first mobile device using the android technology was the HTC dream which was unleashed in the year 2008(Davis &Guy, 74).... On the contrary, the android user interface uses the basic concept of direct manipulation.... Moreover, other additional internal hardware is used by some android applications to act appropriately based on the user's requirement for instance the adjusting of the screen depending on the screens orientation(Gookin &Dan, 69)....
4 Pages (1000 words) Essay

Android System and Its Features

This coursework "android System and Its Features" focuses on android that is not only limited to the operating system but also provides software, middleware and several other applications that are largely in public use today.... hellip; android came into existence in the early years of the first decade of the current century when a number of proponents sat together and decided on introducing a platform that would compete with the existing players....
5 Pages (1250 words) Coursework

How to Build an Android Application

It enables Bluetooth tethering which allowed more devices to share network connections.... The paper "How to Build an android Application" states that the complete application can be deployed to an android phone running android 2.... The android phone has to be first set to development mode before the application can be uploaded into the phone.... hellip; Generally speaking, mobile technology has been greatly revolutionized by the development of the android operating system and platform....
7 Pages (1750 words) Essay

Malware Hiding and/or Spreading on Mobile Devices

This paper can be very useful to any person who wants to be acquainted more about the security of their mobile devices, it gives guidelines on how to prevent persona devices from being attacked and as how to deal with the threats associated with Malware and another virus… Use of mobile devices has risen rapidly in the previous years.... Many people across the world have thus turned to the devices to run a number of tasks such as playing games, banking transactions and getting the direction to various places....
4 Pages (1000 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us