31
101. Satori Threat Intelligence and
Research Team, “Bringing Starchild Down
to Earth: Soraka SDK,” Human Security,
December 2019.
102. Korolov, Maria, “Supply chain attacks
show why you should be wary of third-
party providers,” CSO from International
Data Group, February 4, 2021.
103. Android, “Android Security & Privacy
2018 Year In Review,” March 2019.
104. Clayton, Richard, “Mobile Supply
Chain Attacks Are More Than Just an
Annoyance,” Check Point, 2019.
105. He, Feixiang and Polkovnichenko,
Andrey, “Operation Sheep: Pilfer-Analytics
SDK in Action,” Check Point, March 13, 2019.
106. Trend Micro, “Variant.”
107. Sen, Sevil, et al., “Coevolution of
Mobile Malware and Anti-Malware,” IEEE
Transactions on Information Forensics and
Security, Vol. 13, No. 10, October 2018, pp.
2563-2574.
108. Australian Competition &
Consumer Commission, “Digital Platform
Services Inquiry: Interim Report – App
Marketplaces,” March 2021.
109. Apple Developer, “App Store Review
Guidelines.”
110. Google Play Help, “Google Play
Protect keeps your apps safe and your data
private.”
111. O’Donnell, Lindsey, “Google Play
Cracks Down on Malicious Apps,”
Threatpost, February 14, 2019.
112. Mohan, Babu, “Google now takes
three days to approve new Play Store
apps,” Android Central, August 20, 2019.
113. Apple, “App Store stopped more
than $1.5 billion in potentially fraudulent
transactions in 2020,” May 11, 2021.
114. Guertin, Alec and Kotov, Vadim, “PHA
Family Highlights: Bread (and Friends),”
Google Security Blog, January 9, 2020.
115. Shen, Yun, et al., “A Large-scale
Temporal Measurement of Android
Malicious Apps: Persistence, Migration,
and Lessons Learned,” Cornell University:
Computer Science – Cryptography and
Security, August 10, 2021.
116. Lindorfer, Martina, et al., “AndRadar:
Fast Discovery of Android Applications
in Alternative Markets,” 11th Conference
on Detection of Intrusions and Malware &
Vulnerability Assessment, July 2014.
117. Smith, Chris, “Another crucial reason
why app developers prefer iOS to Android,”
BGR, February 4, 2016.
118. Kujawa, Adam, et al., “2020 State of
Malware Report,” Malwarebytes, February
2020.
119. N-Marandi, Sara, “What’s new in
Android privacy,” Android Developers
Blog, May 18, 2021.
120. Johnson, Kyle, “How do you block
sideloaded app installation on iOS or
Android?,” TechTarget, January 9, 2019.
121. Tee, Mike, “How to Install Apps
from Unknown Sources in Android,”
MakeTechEasier, February 16, 2020.
122. Nickle, Robert, et al., “Lookout
Discovers New Spyware Used by
Sextortionists to Blackmail iOS and Android
Users,” Lookout, December 16, 2020.
123. Nellis, Stephen and Dave, Paresh,
“Software pirates use Apple tech to
put hacked apps on iPhones,” Reuters,
February 13, 2019.
124. Owen, Malcolm, “Apple has revoked
Facebook’s enterprise developer
certificates after sideload violations,”
AppleInsider, January 30, 2019.
125. Axon, Samuel, “Apple revokes
Facebook’s developer certificate over
data-snooping app—Google could be
next,” Ars Technica, January 30, 2019.
126. Xiao, Claud, “Novel Malware
XcodeGhost Modifies Xcode, Infects Apple
iOS Apps and Hits App Store,” Palo Alto
Networks, September 17, 2015.
127. Xiao, Claud, “More Details on the
XcodeGhost Malware and Affected iOS
Apps,” Palo Alto Networks, September 21,
2015.
128. Fischer, Sara, “Facebook says Apple’s
ad changes are hurting its business,”
Axios, September 22, 2021.
129. Seetharaman, Deepa, “Facebook
Removes Data-Security App From Apple
Store,” Wall Street Journal, August 22,
2018.
130. Rosenfelder, Shani, “Global app install
ad spend to double by 2022 to hit $118
billion,” AppsFlyer, February 13, 2020.
131. Brown, Eileen, “Facebook leads app
install market share, but Google is rising
fast,” ZDNet, October 19, 2018.
132. Whittaker, Zack, “Facebook ran ads
for a fake ‘Clubhouse for PC’ app planted
with malware,” TechCrunch, April 8, 2021.
133. Newman, Lily Hay, “Facebook Shut
Down Malware That Hijacked Accounts to
Run Ads,” Wired, October 1, 2020.
134. McGuire, Michael, “The Web of Profit:
Social Media Platforms and the Cybercrime
Economy,” Bromium, 2019.
135. Rastogi, Vaibhav, et al.,
“Understanding In-App Ads and Detecting
Hidden Attacks through the Mobile
App-Web Interface,” IEEE Transactions
on Mobile Computing, Vol. 17, No. 11,
November 1, 2018, pp. 2675-2688.
136. Breitinger, Frank, et al., “A survey
on smartphone users’ security choices,
awareness and education,” Elsevier:
Computers & Security, Vol. 88, October
11, 2019.
137. Centre for International Governance
Innovation – Ipsos, “Global Survey on
Internet Security & Trust,” 2017.
138. App Annie, "The State of Mobile,"
2019.
139. Nelson, Randy, “Store Intelligence:
Q1 2016 Data Digest,” Sensor Tower, April
18, 2016.
140. Sensor Tower, “Q4 2020 Store
Intelligence Data Digest,” 2020.
141. European Union Agency For
Cybersecurity, “Vulnerabilities –
Separating Reality from Hype,” August 24,
2016.
142. Kaspersky and Interpol, “Mobile
Cyber Threats,” October 2014.
143. U.S. Department of Homeland
Security, “Study on Mobile Device
Security,” April 2017.
144. Franklin, Joshua M, et al.,
“Guidelines for Managing the Security of
Mobile Devices in the Enterprise,” U.S.
Department of Commerce – National
Institute of Standards and Technology,
March 2020.
145. Urwin, Matt, “Top 5 Types of
Sideloaded Apps and the Risks They Pose,”
Wandera, December 19, 2018.
146. Velzian, Becci, “How to Create a Bring
Your Own Device (BYOD) Policy,” Wandera,
January 13, 2021.
147. Europol, “Just a Game? Only install
apps from official app stores,” European
Cybercrime Centre.
148. Gervais, Joe, “The risks of third-party
app stores,” Norton, July 18, 2018.