![]() ![]() However, users in other regions looking to get in on the craze could potentially encounter this infected edition. This exploit is not in any official app-store version of Pokémon Go where that game has launched - currently only the United States, Australia and New Zealand. Symantec discovered the malware in late 2014 and describes it as "a Trojan horse for Android devices that opens a back door on the compromised device also steals information." Proofpoint researchers found an APK (the Android app file format) of Pokémon Go carrying the remote-access exploit called DroidJack. Cybersecurity analysts say they have discovered a malware-infected version of Pokémon Go for Android devices, which is of particular concern to those in regions where the extremely popular game has not yet launched and users are installing versions downloaded from file-sharing sites.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |