Skip to main content

42 "dangerous" Chinese smartphone apps you should delete right now

INDIA

42 "dangerous" Chinese smartphone apps you should delete right now


20 Mar 2018 | 

WhatsApp is among the most loved apps in India, but the Indian Army has issued an advisory, warning that Chinese Army is now using WhatsApp as a "hacking tool".


Defense Ministry and Indian intelligence agencies, too, earlier released a list of smartphone apps from Chinese developers, labeling them "malware and spyware".


Here's a list of such 42 apps, including TrueCaller, Xiaomi apps, and CleanMaster.


In context: 42 Chinese apps listed as spyware, malware


20 Mar 2018
42 "dangerous" Chinese smartphone apps you should delete right now



WhatsApp, a new hacking tool for Chinese army: Indian Army


Related Timelines


 


SCIENCE 13 Mar 2018


You can now find places with no addresses on Google-Maps


 


SCIENCE 10 Mar 2018


Forget blue arrows, Google Maps lets you navigate as Mario


 


SCIENCE 06 Feb 2018


Google removes fake version of WhatsApp from Play Store


 


SCIENCE 02 Feb 2018


Government's Cyber Swachhta Project reduces malware infections by 51%


 


BUSINESS 22 Jan 2018


After WhatsApp Business, "Paytm for Business" app launched on Android


 


SCIENCE 17 Jan 2018


Kaspersky identifies advanced virus that can 'steal' WhatsApp messages


 


SCIENCE 14 Jan 2018


Bug made WhatsApp 'obsolete' for some users: Here's the fix


 


SCIENCE 13 Jan 2018


Google deletes 60 kids apps, after they showed pornographic content


What did the Defense Ministry say?


"A number of Android/iOS apps developed by Chinese developers...are reportedly either spyware or other malicious ware. Use of these apps by our force personnel can be detrimental to data security having implications on the force and national security," read a previous Defense Ministry order.





Browsers, Launchers
UC Browser, CM Browser are among dangerous apps


Several popular mobile web browsers and launcher apps that allow users to customize home screen looks/backgrounds/themes, launch apps, and perform other activities are reportedly dangerous according to the government.


Such apps include UC Browser, CM Browser, DU Browser, and QQ Launcher.


UC Browser and CM Browser are quite popular with over 500 million and 50 million downloads (on Play Store), respectively.


Cleaner, Booster apps
These Chinese apps offering security, device-boosting tools are "malicious"


Eight mobile apps offering tools for device optimization/boosting, battery saving, app locking, junk cleaning, device cleaning, game boosting, security, and storage space management are also on the list of dangerous apps, including the most famous Clean Master (Cheetah Mobile) app.


Others include Virus Cleaner (Hi Security Lab), DU Battery Saver, CacheClear DU apps studio, DU Cleaner, DU Privacy, 360 Security, and QQ Security Centre.


Photo, Video Editors
What about selfie camera apps and photo editing apps?


Many smartphone owners use third-party apps to enhance/beautify pictures, edit them, add filters/effects, remove imperfections, etc. Several Chinese developers offer such "selfie camera" apps, and six of them are also on the list released by the government.


They include YouCam Makeup, BeautyPlus, Perfect Corp, Wonder Camera, Photo Wonder, and SelfieCity.


Video/photo app VivaVideo (QU Video Inc) and DU Recorder are also reportedly malicious.


Social Media, File Managers
WeChat and SHAREit, too, are not safe apps


Popular Chinese microblogging and instant messaging apps like Weibo (Twitter-like app) and WeChat are used by millions, but the government says they spread spyware and malware.


Apps for sharing, managing, and hiding the files on one's device, including the most popular SHAREit, Vault-Hide, WeSync, and ES File Explorer are on the list too. Parallel Space app (creates multiple app accounts) is also dangerous.


Details
These official apps from Xiaomi and TrueCaller are malicious, too


Shockingly, Chinese smartphone company Xiaomi's official apps Mi Community, Mi Store, and Mi Video Call were also labeled "dangerous" by the government.


However, Xiaomi issued a statement at the time saying that it takes "security and privacy" of its users serious, adding it was investigating the government's advisory.


TrueCaller also found itself on the list following which the company claimed it isn't a malware.


Apps providing news and other popular apps


Popular mobile news aggregator and content providing apps like UC News, NewsDog, and QQ NewsFeed are also reportedly spreading spyware and malware. Other apps on the list include Baidu Translate, Baidu Map, QQ International, QQ Music, QQ Mail, QQ Player, and Mail Master.



Comments

Popular posts from this blog

Bypass Ubuntu Login Screen

Here is the new post on the series of the bypassing of the login screens of the different Operating Systems . In this post, we are going to bypass login screen of the 'Ubuntu 16.04 LTS' . This method is basically works on all Ubuntu . Here is the screen of the Login of the Ubuntu 16.04 LTS which we are going to bypass. STEPS:- Steps 1 :  First restart the system and load the GRUB menu by holding SHIFT  key when the BIOS  loads. After that selects ' Advanced Options ' and you will get this menu. Steps 2 :  Then selects recovery mode on the above menu and you will get the following menu. Steps 3 :  Then selects the root menu and you will dropped into root shell of the system. Steps 4 :  Then run the following commands: mount -rw -o remount / passwd <username> After the successful completion of the command, you have successfully changed the root password of the system. You find the root username of the system by changing to the syst

Bypass Kali Linux Login Screen

This is the another post of the Operating System Login Mechanism bypass series. In this post, we are going to bypass the login screen of the Kali Linux that works on all Kali rollings. This is method is slightly different from the method of the Ubuntu. STEPS:- Step 1 :  First, boot the Kali rolling and you will find the GRUB Menu of the KALI. Step 2 :  Then press 'e'  key to load the GRUB. Step 3 :  After that, replace 'ro'  to 'rw'  and 'init=/bin/bash'  at the same line and press 'F10'  key to load with this GRUB file. Step 4 :  After the boot, you will dropped into the root shell of the system. Step 5 :  Now, type 'passwd root'  command and enter the new unix password twice of the root user. Now, Reboot the system and boot normally and you are able to login to the root account of the Kali-rolling with the new password. Post written by - M4TRIX_H4CK3R Author  -  https://en.gravatar.com/kalima