{"id":328,"date":"2022-07-03T14:26:10","date_gmt":"2022-07-03T14:26:10","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=328"},"modified":"2022-07-03T14:26:10","modified_gmt":"2022-07-03T14:26:10","slug":"microsoft-avverte-utenti-android-di-app-malware-in-evoluzione-per-frode-a-tariffa","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/it\/notizie\/microsoft-avverte-utenti-android-di-app-malware-in-evoluzione-per-frode-a-tariffa\/","title":{"rendered":"Microsoft mette in guardia gli utenti di telefoni Android dall'evoluzione delle applicazioni malware per la frode del pedaggio"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Se siete utenti di telefoni Android, Microsoft vi avverte: fate attenzione alle applicazioni malware per le frodi sui pedaggi. Queste app sono diventate sempre pi\u00f9 complesse e difficili da individuare, con l'intento di rubare i vostri soldi addebitandovi costi di abbonamento nascosti. Microsoft ha illustrato le fasi di questo attacco maligno in un post sul blog, in modo che possiate essere consapevoli dei pericoli e proteggervi.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">La frode del pedaggio, nota anche come \"virus freemium\" o \"trapware\", \u00e8 una frode di fatturazione in cui persone ignare vengono indotte a pagare per contenuti premium a loro insaputa o senza il loro consenso. Si differenzia da altri pericoli di fleeceware in quanto le funzionalit\u00e0 dannose vengono attivate solo quando un hacker collega il gadget a uno degli operatori di rete target.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Inoltre, secondo\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/06\/30\/toll-fraud-malware-how-an-android-application-can-drain-your-wallet\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Valsamaras e Shin Jung<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0del team di ricerca di Microsoft 365 Defender, \u00e8 stato scoperto che per impostazione predefinita si connette alla rete cellulare per le attivit\u00e0 anche se \u00e8 disponibile una connessione Wi-Fi. \"Lo fa per impostazione predefinita\", hanno dichiarato.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">In seguito, crea un abbonamento fasullo e lo conferma nuovamente dopo aver stabilito un collegamento a una rete specifica.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">L'ultima versione della piattaforma Magento utilizza una serie di soluzioni di sicurezza interne e di terze parti per proteggere dalle frodi online utilizzando diversi metodi, tra cui:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Le frodi sui pedaggi si verificano quando i consumatori utilizzano un servizio legittimo a pagamento fornito da un sito web abilitato WAP per ottenere articoli o servizi non autorizzati dal venditore. L'addebito sulla bolletta del cellulare avviene automaticamente, senza che sia necessario creare una carta di credito o di debito o fornire un nome utente e una password.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Secondo\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2017_mobile-trojans-revert-to-old-techniques-and-steal-users-money-through-wap-billing-services\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Kaspersky<\/span><\/a><span data-preserver-spaces=\"true\">, gli hacker possono determinare l'indirizzo IP di un trojan di fatturazione WAP se l'utente si connette a Internet utilizzando i dati mobili. \"Gli utenti vengono addebitati solo se vengono identificati correttamente, cosa che avviene con facilit\u00e0\", afferma uno studio del 2017 di Kaspersky sui trojan di fatturazione WAP.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Alcune aziende possono richiedere gli OTP come secondo livello di verifica prima di attivare il servizio.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Il malware esegue la sottoscrizione per conto dell'utente in modo apparentemente genuino. Il malware comunica con un server [command-and-control] per ottenere un elenco dei servizi disponibili.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Il malware scarica diversi file dal sito web compromesso, tra cui AdNab.exe e rundll32.exe. Utilizza quindi JavaScript per iscriversi di nascosto al servizio e ricevere e inviare il codice OTP (se richiesto). I programmatori hanno progettato il codice JavaScript in modo da utilizzare un approccio programmatico per avviare la sottoscrizione controllando gli elementi HTML contenenti parole chiave come \"conferma\", \"clic\" o \"continua\".<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Il malware pu\u00f2 cancellare i messaggi di testo in entrata contenenti informazioni sul servizio sottoscritto dall'operatore di rete mobile se la sottoscrizione fraudolenta va a buon fine.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">La capacit\u00e0 di caricamento dinamico del codice di Android, che consente alle applicazioni di scaricare moduli aggiuntivi da un server remoto durante l'esecuzione, rende facile per i malintenzionati sfruttare il sistema.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Gli autori di malware possono creare un'applicazione che si comporta male. Ma il comportamento scorretto si verifica solo se si verificano circostanze specifiche. Sar\u00e0 quindi difficile trovare questo comportamento scorretto utilizzando i controlli statici di analisi del codice sul lato della sicurezza.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Il malware back door \u00e8 un software dannoso installato tramite un'app che produce codice generato dinamicamente per catturare i messaggi di testo, come descritto in\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/developers.google.com\/android\/play-protect\/potentially-harmful-applications\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Documentazione per sviluppatori di Google<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0per le applicazioni potenzialmente dannose (PHA).<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">I pedaggi sono diventati un'attivit\u00e0 lucrativa per gli hacker, con applicazioni fraudolente che rappresentano il 34,8 percento di tutti i PHA stabiliti attraverso il mercato delle app Android nei primi tre mesi del 2022, piazzandosi al secondo posto subito dopo lo spyware. La maggior parte delle installazioni \u00e8 stata osservata in India, Russia, Messico, Indonesia e Turchia.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Se vuoi evitare di essere vittima di malware per frode sui pedaggi, segui le istruzioni descritte in questo articolo del blog. Gli utenti dovrebbero ottenere applicazioni solo dal Google Play Store o da altre fonti legittime. Dovrebbero limitare i privilegi delle app e considerare di sostituire il telefono se non riceve aggiornamenti.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Se siete utenti di telefoni Android, Microsoft vi avverte: fate attenzione alle applicazioni malware per le frodi sui pedaggi. Queste app sono diventate pi\u00f9 complesse e difficili da individuare, con l'intento di rubare... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/it\/notizie\/microsoft-avverte-utenti-android-di-app-malware-in-evoluzione-per-frode-a-tariffa\/\">Continue reading <span class=\"screen-reader-text\">Microsoft mette in guardia gli utenti di telefoni Android dall'evoluzione delle applicazioni malware per la frode del pedaggio<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-328","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing<\/title>\n<meta name=\"description\" content=\"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/it\/notizie\/microsoft-avverte-utenti-android-di-app-malware-in-evoluzione-per-frode-a-tariffa\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/it\/notizie\/microsoft-avverte-utenti-android-di-app-malware-in-evoluzione-per-frode-a-tariffa\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-03T14:26:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps\",\"datePublished\":\"2022-07-03T14:26:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\",\"name\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"datePublished\":\"2022-07-03T14:26:10+00:00\",\"description\":\"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg\",\"width\":850,\"height\":565,\"caption\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/it\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft avverte gli utenti di telefoni Android dell'evoluzione delle app malware per frode sui pedaggi | Briefing sulla sicurezza","description":"Fate attenzione alle applicazioni malware per le frodi sui pedaggi. Queste applicazioni sono diventate sempre pi\u00f9 complesse e difficili da individuare, con l'intento di rubare il vostro denaro addebitandovi costi di abbonamento nascosti.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/it\/notizie\/microsoft-avverte-utenti-android-di-app-malware-in-evoluzione-per-frode-a-tariffa\/","og_locale":"it_IT","og_type":"article","og_title":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps | Security Briefing","og_description":"Watch out for toll fraud malware apps. These apps have become more complex and harder to detect, intending to steal your money by charging you hidden subscription fees.","og_url":"https:\/\/securitybriefing.net\/it\/notizie\/microsoft-avverte-utenti-android-di-app-malware-in-evoluzione-per-frode-a-tariffa\/","og_site_name":"Security Briefing","article_published_time":"2022-07-03T14:26:10+00:00","og_image":[{"width":850,"height":565,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"security","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps","datePublished":"2022-07-03T14:26:10+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/"},"wordCount":644,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","articleSection":["News"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/","url":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/","name":"Microsoft avverte gli utenti di telefoni Android dell'evoluzione delle app malware per frode sui pedaggi | Briefing sulla sicurezza","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","datePublished":"2022-07-03T14:26:10+00:00","description":"Fate attenzione alle applicazioni malware per le frodi sui pedaggi. Queste applicazioni sono diventate sempre pi\u00f9 complesse e difficili da individuare, con l'intento di rubare il vostro denaro addebitandovi costi di abbonamento nascosti.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Microsoft-Warns-Android-Phone-Users-of-Evolving-Toll-Fraud-Malware-Apps.jpg","width":850,"height":565,"caption":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/microsoft-warns-android-phone-users-of-evolving-toll-fraud-malware-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Microsoft Warns Android Phone Users of Evolving Toll Fraud Malware Apps"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Briefing sulla sicurezza","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Briefing sulla sicurezza","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sicurezza","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e8 una redattrice senior per Government Technology. In precedenza ha scritto per PYMNTS e The Bay State Banner e ha conseguito una laurea in scrittura creativa alla Carnegie Mellon. Risiede fuori Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/it\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media\/329"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}