sometimes, “met the demand for apps before
legitimate vendors did. Often repackaging legitimate
applications to include malware and offering it for free
on alternative channels is a main venue for malware
distribution (Gangula, Ansari, and Gondhalekar,
2013). Fake Pinterest apps appeared in the market
months before the official version came out. These
fake apps are often hosted on Russian domains, with a
domain for each fake app. More and more mobile
platforms are being targeted by threat actors and
software susceptibilities have been exploited by
cybercriminals for their malicious schemes. Android
vulnerabilities were discovered in 2012. Patching
mobile vulnerabilities may be difficult as phone
manufacturers are slow to release updates and often
customize the operating system. Application
developers assimilate advertising libraries to their
apps to produce revenue (
Vallina-Rodriguez et al., 2012).
Research shows that 90% of free apps contain ads, and
through these they found apps with ads that try to
gather information without explicitly alerting users
(
Grace et al., 2012). These ads are reminiscent of
windows adware, which afflicts desktops and laptop
and irritates users with its pop-up messages.
The prevalence of these aggressive adware
brought three major issues forward: “fraudulent text
messages: ad networks sometimes send out ads in the
form of fake text messages. This method tricks users
to click ads. User annoyance: some apps to advertisers
send out constant notifications or announcements. Not
only does this annoy users, it also contributes to
battery drainage. Data leakage: ad libraries can collect
sensitive data like GPS location, call logs, phone
numbers, and device information. One study found
that some ad libraries even made personal information
directly accessible. Ad libraries expanded the number
of parties privy to private information, which can lead
to misuse” (TrendMicro Lab, 2012).
The most common and devastating form of
malware is computer virus. When executed, it
replicates by copying itself into other computer
programs, data files, or the boot sector of the hard
drive infecting computer programs and files. Thus, it
alters the way your computer operates or stops it from
working altogether. Some of the ways you can pick up
computer viruses is through normal web activities
such as sharing music, files or photos with other users,
visiting an infected web site, opening spam email or
an email attachment, downloading free games,
toolbars, media players and other system utilities, and
installing mainstream software applications without
fully reading license agreements (Webroot, 2010).
Even the least harmful viruses can disrupt
system’s performance, “sapping computer memory
and causing frequent computer crashes.” there are
malware attack symptoms, which people should
carefully recognize to take proper caution. Such
symptoms include: slow computer performance,
erratic computer behavior, unexplained data loss, and
frequent computer crashes. According to the computer
virus statistics report (Statistics Brain) , 24 million US
households have experienced heavy spam. Within
these households, the number that have had spyware
problems was 8 million, whilst the number of
households that have had serious virus problems was
16 million. From this, one can note that virus has hit
home users more prevalently than any other type of
threats (misc. trojans, trojan downloaders and
droppers, misc. potentially unwanted software,
adware, exploits, worms, password stealers and
monitoring tools, backdoors, and spyware). Out of
these threats, virus was coined the most dominant
threat to users by 57%. The rest of the threats were
below 20%.
Malware quarterly report for 2012 for home
network infection rates has revealed that in fixed
broadband deployments, 13% of residential household
showed evidence of malware infection (Alcatel-
Lucent, 2013). This is only a slight decrease from 14%
in q2 report. High level threats, such as botnet, rootkit,
or banking Trojans, have infected 6.5% of households,
and 8.1% of households were infected with a moderate
threat level malware (spyware, browser hijackers or
adware). Based on the above data, home users are
targeted by threats every day. The effects of malware
can be highly annoying to users as an infection of a
file can lead to computer slowdown or alteration of
system functionality.
4 OUR STUDY
The Survey contained 33 questions ranging from
demographics of the users to identifying the type of
mobile devices used by the students and subsequently
comparing the degree of the vulnerabilities of various
mobile devices to malware attacks and users’
responses to such attacks, and more. 178 completed
responses were used as our sample set to perform
descriptive and predictive statistics where we tried to
draw inferences about population based on an analysis
of the sample data. Focusing primarily on descriptive
analysis, we compared and contrasted our results with
some studies involving general households to provide
a picture of how millennials’
behavior parallels to
what is known as “the norm” of the society. To
generalize the results, a set of assumptions were
identified as research questions and fall in four
categories as listed below: