{"id":311,"date":"2022-06-28T23:36:19","date_gmt":"2022-06-28T23:36:19","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=311"},"modified":"2022-06-28T23:36:19","modified_gmt":"2022-06-28T23:36:19","slug":"rosszindulatu-szoftverrel-rendelkezo-androidos-alkalmazasok-a-play-aruhazban-talalhatok","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/rosszindulatu-szoftverrel-rendelkezo-androidos-alkalmazasok-a-play-aruhazban-talalhatok\/","title":{"rendered":"Rosszindulat\u00fa szoftverekkel rendelkez\u0151 Android alkalmaz\u00e1sok a Play Store-ban"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">A Google Play \u00c1ruh\u00e1z nem biztons\u00e1gos hely az Android telefonod sz\u00e1m\u00e1ra. Egy friss jelent\u00e9s szerint a hackerek legal\u00e1bb 12 alkalmaz\u00e1st fert\u0151ztek meg az \u00e1ruh\u00e1zban rosszindulat\u00fa szoftverrel, amely szem\u00e9lyes adatokat lophat el, \u00e9s nagy k\u00e1rokat okozhat a k\u00e9sz\u00fcl\u00e9kedben vagy adataidban, ha telep\u00edted! Teh\u00e1t miel\u0151tt b\u00e1rmi m\u00e1st let\u00f6lten\u00e9l, gy\u0151z\u0151dj meg r\u00f3la, hogy hivatalos forr\u00e1sb\u00f3l sz\u00e1rmazik, p\u00e9ld\u00e1ul a Google-t\u0151l (hacsak m\u00e1sk\u00e9nt nincs megadva).<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hogyan ker\u00fclnek a rosszindulat\u00fa szoftvereket tartalmaz\u00f3 Android alkalmaz\u00e1sok a Google Play \u00c1ruh\u00e1zba?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">M\u00e9g mindig nem tiszt\u00e1zott, hogyan ker\u00fcltek ezek a rosszindulat\u00fa szoftvereket tartalmaz\u00f3 alkalmaz\u00e1sok az \u00e1ruh\u00e1zba. Val\u00f3sz\u00edn\u0171leg ezeknek az alkalmaz\u00e1soknak a fejleszt\u0151i nem voltak tiszt\u00e1ban a rosszindulat\u00fa szoftver jelenl\u00e9t\u00e9vel a k\u00f3djukban. Vagy sz\u00e1nd\u00e9kosan tartalmazt\u00e1k a rosszindulat\u00fa k\u00f3dot, hogy hirdet\u00e9si bev\u00e9telb\u0151l p\u00e9nzt keressenek. Ak\u00e1rhogy is, \u00f3vatosnak kell lenned az alkalmaz\u00e1sokkal, amelyeket a telefonodra telep\u00edtesz.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hogyan v\u00e9dheted meg a k\u00e9sz\u00fcl\u00e9kedet a rosszindulat\u00fa alkalmaz\u00e1sokt\u00f3l?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">N\u00e9h\u00e1ny dolgot megtehetsz, hogy megv\u00e9dd a k\u00e9sz\u00fcl\u00e9kedet a rosszindulat\u00fa alkalmaz\u00e1sokt\u00f3l:<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\">Gy\u0151z\u0151dj meg r\u00f3la, hogy van egy j\u00f3 v\u00edrusirt\u00f3 program telep\u00edtve a telefonodon. Egy v\u00edrusirt\u00f3 program seg\u00edt \u00e1tvizsg\u00e1lni \u00e9s elt\u00e1vol\u00edtani minden rosszindulat\u00fa szoftvert, amely jelen lehet a k\u00e9sz\u00fcl\u00e9keden.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Csak megb\u00edzhat\u00f3 forr\u00e1sokb\u00f3l, p\u00e9ld\u00e1ul a Google Play \u00c1ruh\u00e1zb\u00f3l t\u00f6lts le alkalmaz\u00e1sokat.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Mindig olvasd el egy alkalmaz\u00e1s \u00e9rt\u00e9kel\u00e9seit, miel\u0151tt let\u00f6lt\u00f6d.<\/span><\/li>\n<\/ol>\n<p><span data-preserver-spaces=\"true\">Az \u00e9rt\u00e9kel\u00e9sek elolvas\u00e1sa seg\u00edt azonos\u00edtani az alkalmaz\u00e1ssal kapcsolatos esetleges kock\u00e1zatokat.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ezeket az egyszer\u0171 tippeket k\u00f6vetve megv\u00e9dheted Android telefonodat a rosszindulat\u00fa szoftverekt\u0151l \u00e9s egy\u00e9b fenyeget\u00e9sekt\u0151l. Teh\u00e1t tartsd ezeket szem el\u0151tt, amikor legk\u00f6zelebb alkalmaz\u00e1st t\u00f6ltesz le.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Mely alkalmaz\u00e1sokat fert\u0151zte meg a rosszindulat\u00fa szoftver?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">\u00d6t fert\u0151z\u00f6tt alkalmaz\u00e1s volt el\u00e9rhet\u0151 let\u00f6lt\u00e9sre a Play \u00c1ruh\u00e1zban:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Wild &amp; Exotic Animal Wallpaper: Tartalmaz egy rekl\u00e1mprogramot, amely telep\u00edt\u00e9s ut\u00e1n \u00e1tnevezi mag\u00e1t SIM Tool Kit-re. Eddig 500 000 let\u00f6lt\u00e9st kapott.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">PIP Pic Camera Photo Editor: Ez a szoftver egy hamis k\u00e9pszerkeszt\u0151, amely ellopja a felhaszn\u00e1l\u00f3k Facebook jelszavait. Az Android felhaszn\u00e1l\u00f3k m\u00e1r t\u00f6bb mint 100 000 alkalommal let\u00f6lt\u00f6tt\u00e9k ezt a programot.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">ZodiHoroscope: Ez egy m\u00e1sik k\u00e1ros program, amely a Facebook hiteles\u00edt\u0151 adatait c\u00e9lozza meg. A felhaszn\u00e1l\u00f3k k\u00f6r\u00fclbel\u00fcl 500 000 alkalommal t\u00f6lt\u00f6tt\u00e9k le az alkalmaz\u00e1st.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">PIP Camera 2022: Ez az alkalmaz\u00e1s, amely k\u00fcl\u00f6nf\u00e9le kameraeffekteket \u00edg\u00e9r, val\u00f3j\u00e1ban rosszindulat\u00fa szoftvert tartalmaz, amely 50 000 felhaszn\u00e1l\u00f3 Facebook profiladatait lopja el. K\u00f6r\u00fclbel\u00fcl 50 000 ember t\u00f6lt\u00f6tte le.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Magnifier Flashlight: Rekl\u00e1mprogram van jelen ebben a rosszindulat\u00fa programban, amelyet k\u00f6r\u00fclbel\u00fcl 10 000 alkalommal t\u00f6lt\u00f6ttek le.<\/span><\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">Hogyan ker\u00fclhetik el az Android fejleszt\u0151k a rosszindulat\u00fa szoftvereket?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Ha Android fejleszt\u0151 vagy, n\u00e9h\u00e1ny dolgot megtehetsz, hogy elker\u00fcld a rosszindulat\u00fa szoftvereket az alkalmaz\u00e1saidban:<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\">Mindig megb\u00edzhat\u00f3 fejleszt\u0151i eszk\u00f6z\u00f6ket \u00e9s keretrendszereket haszn\u00e1lj.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Tartsd naprak\u00e9szen a k\u00f3dodat \u00e9s a f\u00fcgg\u0151s\u00e9geidet.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Haszn\u00e1lj egy megb\u00edzhat\u00f3 mobilbiztons\u00e1gi megold\u00e1st, hogy \u00e1tvizsg\u00e1ld a k\u00f3dodat az esetleges sebezhet\u0151s\u00e9gek\u00e9rt.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Soha ne haszn\u00e1ld \u00fajra a k\u00f3dot megb\u00edzhatatlan forr\u00e1sokb\u00f3l.<\/span><\/li>\n<\/ol>\n<p><span data-preserver-spaces=\"true\">Ezeket az egyszer\u0171 tippeket k\u00f6vetve seg\u00edthetsz megv\u00e9deni az alkalmaz\u00e1saidat a rosszindulat\u00fa szoftverekt\u0151l. \u00c9s ha kider\u00fcl, hogy az alkalmaz\u00e1sod megfert\u0151z\u0151d\u00f6tt rosszindulat\u00fa szoftverrel, azonnal t\u00e1vol\u00edtsd el, \u00e9s \u00e9rtes\u00edtsd a felhaszn\u00e1l\u00f3idat.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Mi volt a Google Play v\u00e1lasza?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">A Google elt\u00e1vol\u00edtotta a fert\u0151z\u00f6tt alkalmaz\u00e1sokat a Play \u00c1ruh\u00e1zb\u00f3l, \u00e9s azon dolgozik, hogy jav\u00edtsa biztons\u00e1gi int\u00e9zked\u00e9seit az ilyen incidensek megel\u0151z\u00e9se \u00e9rdek\u00e9ben.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Minden Android felhaszn\u00e1l\u00f3nak azt tan\u00e1csoljuk, hogy legyenek \u00e9berek az alkalmaz\u00e1sokkal kapcsolatban, amelyeket let\u00f6ltenek \u00e9s telep\u00edtenek a k\u00e9sz\u00fcl\u00e9keikre. \u00c9s ha tal\u00e1lsz egy alkalmaz\u00e1st, amelyr\u0151l gyan\u00edtod, hogy rosszindulat\u00fa, jelentsd a Google-nak.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">K\u00f6vetkeztet\u00e9s<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Ezek csak n\u00e9h\u00e1ny azok k\u00f6z\u00fcl az alkalmaz\u00e1sok k\u00f6z\u00fcl, amelyeket a kutat\u00f3k rosszindulat\u00fa szoftverrel fert\u0151z\u00f6ttnek tal\u00e1ltak. Teh\u00e1t ha b\u00e1rmelyik ezek k\u00f6z\u00fcl telep\u00edtve van a telefonodon, azonnal t\u00e1vol\u00edtsd el \u0151ket. \u00c9s mindig l\u00e9gy \u00f3vatos az alkalmaz\u00e1sokkal, amelyeket a Google Play \u00c1ruh\u00e1zb\u00f3l t\u00f6ltesz le. Ezeket az egyszer\u0171 tippeket k\u00f6vetve megv\u00e9dheted a k\u00e9sz\u00fcl\u00e9kedet a rosszindulat\u00fa szoftverekt\u0151l.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Google Play Store is not a safe place for your Android phone. A recent report revealed that hackers infected at least 12 apps on the store with malware, which can\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/rosszindulatu-szoftverrel-rendelkezo-androidos-alkalmazasok-a-play-aruhazban-talalhatok\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Rosszindulat\u00fa szoftverekkel rendelkez\u0151 Android alkalmaz\u00e1sok a Play Store-ban<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":312,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Apps with Malware Found on Play Store | Security Briefing<\/title>\n<meta name=\"description\" content=\"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/rosszindulatu-szoftverrel-rendelkezo-androidos-alkalmazasok-a-play-aruhazban-talalhatok\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Apps with Malware Found on Play Store | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/rosszindulatu-szoftverrel-rendelkezo-androidos-alkalmazasok-a-play-aruhazban-talalhatok\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T23:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Android Apps with Malware Found on Play Store\",\"datePublished\":\"2022-06-28T23:36:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\",\"name\":\"Android Apps with Malware Found on Play Store | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"datePublished\":\"2022-06-28T23:36:19+00:00\",\"description\":\"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Android-Apps-with-Malware-Found-on-Play-Store\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Apps with Malware Found on Play Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rosszindulat\u00fa szoftverrel rendelkez\u0151 Android-alkalmaz\u00e1sok a Play \u00c1ruh\u00e1zban | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Egy friss jelent\u00e9s szerint legal\u00e1bb egy tucat alkalmaz\u00e1s a Google Play \u00c1ruh\u00e1zban rosszindulat\u00fa szoftverrel fert\u0151z\u00f6tt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/rosszindulatu-szoftverrel-rendelkezo-androidos-alkalmazasok-a-play-aruhazban-talalhatok\/","og_locale":"hu_HU","og_type":"article","og_title":"Android Apps with Malware Found on Play Store | Security Briefing","og_description":"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.","og_url":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/rosszindulatu-szoftverrel-rendelkezo-androidos-alkalmazasok-a-play-aruhazban-talalhatok\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T23:36:19+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"3 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Android Apps with Malware Found on Play Store","datePublished":"2022-06-28T23:36:19+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/"},"wordCount":598,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/","name":"Rosszindulat\u00fa szoftverrel rendelkez\u0151 Android-alkalmaz\u00e1sok a Play \u00c1ruh\u00e1zban | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","datePublished":"2022-06-28T23:36:19+00:00","description":"Egy friss jelent\u00e9s szerint legal\u00e1bb egy tucat alkalmaz\u00e1s a Google Play \u00c1ruh\u00e1zban rosszindulat\u00fa szoftverrel fert\u0151z\u00f6tt.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","width":1000,"height":667,"caption":"Android-Apps-with-Malware-Found-on-Play-Store"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Android Apps with Malware Found on Play Store"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/312"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}