Evaluation of Source: “Windows Malware tries to Infect Android devices Connected to PCs” - Essay Example


Extract of sample
Evaluation of Source: “Windows Malware tries to Infect Android devices Connected to PCs”

This article provides insight on various aspects that are mind opening and are verifiable. The article “Windows Malware tries to Infect Android devices Connected to PCs” is current, authentic and is backed up by research; therefore, it can be used for my research.
This source outstands from the rest in various aspects. Firstly, having been written in the year 2014, the article provides some of the most recent information about the malware technologies. Secondly, the article is presented in a form that is meant to attract professionals in this field. Otherwise, a layman may read the article but they may not fully understand the concepts and terms that have been used in the article. This sets the article apart from any other article related to such a topic, for example;
“The Trojan program downloads the malicious APK, as well as the Android Debug Bridge (ADB) command line tool that allows users to execute commands on Android devices connected to a PC. ADB is part of the official Android software development kit (SDK) (Constantin 1).
Such a statement is very technical language; it requires an individual who is conversant with the field to understand what the author is up to.
The authenticity of this article is enhanced by the research done by Symantec. This research gives the article the weight to be used in any research work. However, the information is not peer reviewed and cannot be used for scholarly works. The article features quotes from some of the researchers. Flora Liu, one of the researchers at Symantec points out that, “interestingly, we recently came across something that works the other way round, a windows threat that attempts to infect android devices” (Constantin 1). In the quote Liu was pointing out that despite in the past having devices infect the PC, the scenario has changed, the malware is capable of infecting android PCs. ...
Download paper


Computer and mobile technology has continued to grow and it appears that the best is not yet to be. While technologists and experts are busy developing new products as well as innovating the preexisting ones, there are the malicious ones who have gone ahead to develop programs that have the capability to corrupt these systems…
Author : srosenbaum
Download 1

Related Essays

What is Android?
phones and gadgets. In This way many forces have emerged that introduced open source softwares and operating systems that gave a total new shape to the world of communications and hand held devices. One of them in this field was Android .Android is an open source operating system that is widely in use in smart phones and portable computers in form of laptops and tablets. Android came into existence in the early years of first decade of current century when number of proponents sat together and decided on introducing a platform that would compete the existing players . Andy Rubin and Nick Sears...
7 pages (1757 words) Research Paper
Apple should move to a "bazaar", or open source, model of development similar to Android because this model promotes innovat
Prior to the conversion, it was the “bazaar” system which was commonly adopted by companies all around the world. Raymond (2001) unambiguously specifies regarding the advantages to implement an open source business model towards obtaining greater competitive advantages and scope for continuous development through innovation. One of the most prominent examples to identify the virtues of an “open source” business model can be regarded with reference to the case of Android software. Notably, it was the open source development model which promoted commercial business of software that...
4 pages (1004 words) Essay
The study has a narrower scope but presents a thorough research in the two hospital comparison scenario. The strength of this report lies in its discussion of the results of implementation of similar programs earlier. The risk of implementing the recommendations is lower since the results accommodate other recommendations too. Further, the quality of the research is exceptional due to the details attached. The methodology of the study is reasonable due to the sample size being a fair percentage of the actual population.
1 pages (251 words) Research Proposal
Evaluation Methods
t will first provide a brief overview of evaluation design and methodology followed by discussing the importance of strategic questioning, interview techniques, and evaluation design. Eventually, the student will examine the different types of research evaluation designs and methodologies by comparing and contrasting each of the widely used research evaluation and methodologies. Based on the scope and limitation of each research evaluation design and methodology, the type of research study wherein each of the research evaluation design and methodology is proven to be effective will be...
7 pages (1757 words) Coursework
Android and Apple Comparison
iOS came in the first version of iPhone in 2007 and since then, it has been one of the most illustrious mobile firmware till date. Steve Jobs was the man behind the creation of Apple Inc. and its respective software’s. There are more than 400 million iOS enabled devices all around the world. Apple holds second position in terms of market share of Smart phones industry (Lee 31)....
5 pages (1255 words) Research Paper
e open handset alliance can be characterised as a consortium of telecommunication companies aimed at promoting the open standards of mobile technology. Incidentally, the first mobile device using the android technology was the HTC dream which was unleashed in the year 2008(Davis &Guy, 74). On the contrary, the android user interface uses the basic concept of direct manipulation. Furthermore, with the aid of touch input which are made to resemble the real world actions for instance the swiping, tapping among other techniques to control the objects visible in the screen of the device. Moreover,...
5 pages (1255 words) Essay
Investigating Dynamic Malware Analysis tool
It has been identified that the sandbox tools are effective in terms of updating the malware signature databases and understanding the behavioral patterns of such codes....
20 pages (5020 words) Research Paper
Got a tricky question? Receive an answer from students like you! Try us!