As long as it’s downloaded from a legit source such as the Play Store, you can guarantee that you’re getting a safe app. Not only does it offer full functionality, but it also has less spam than most phone cleaners.Ĭontrary to its PC version, the CCleaner for Android has not been subject to prejudice about having malware. While it’s PC version has gone downhill, for the most part, the Android version is still considered to be one of the best phone cleaner apps available in the market today. Why and Why Not? © Photo by CCleaner from the Play StoreĬCleaner is essentially safe to use for mobile platforms. Is CCleaner safe to use? Let’s look at a couple of factors that can affect the answer to the question. Whether you’re using it on your PC or your mobile phone, it helps to be cautious about the programs that you decide to install. Like many apps, there have been questions as to the safety of CCleaner. Some users love the app because it works great for them, but others don’t seem to enjoy the app as much as the next person. It will easily help you boost a slow phone and even free-up space to further optimize your phone. ![]() Its claim to fame is to allow users to become the masters of their devices with the app. With it, phone optimization becomes easier and quicker. It’s a cleaner app that does everything - from removing junk, clearing RAM, and keeping an eye on your system for errors. Now, it’s an Android app that allows you to make the most out of your phone. What is CCleaner? © Photo by CCleaner from the Play StoreĬCleaner is software that was first released for PC. Such attacks are likely to continue for the coming years, especially as most companies migrate their infrastructure to centrally-managed cloud-based systems.This article will take a look at why or why not the app is safe and a couple of alternatives that you might want to consider. Supply-chain attacks are today's top threat, and government agencies in the US and France have recently issued alerts about an ongoing campaign perpetrated by Chinese hackers. "We believe all global software companies, including both Microsoft and us at Avast, will need to continue to vigilantly protect our networks from attacks by those who seek to damage us and our users," Avast told us.īut Avast and TeamViewer aren't the only companies that have been targeted only to serve as a jumping point into the network of other companies. As long as an app is good at its job, hackers are going to keep coming. As the company told ZDNet, the threats it's facing are no different than what its competitors are facing.įor example, TeamViewer, which offers an eponymously named product, also suffered a security breach at the hands of Chinese hackers back in 2016. However, this huge userbase is also the reason why Avast bought it in the first place.Īvast's plan of attack involves bolstering its security. The app's gigantic userbase makes CCleaner a perfect target for supply-chain attacks. It's an all-in-one system administration toolkit, and one very good at its job, if we're to look at its download numbers. The app now supports remote management features, hard drive defragmentation, email alerts, cloud-based management features, and many more. ![]() However, as previously stated in this article, today, CCleaner is more than just a "useless" registry cleaner. In the light of this second hack, many users have expressed their opinions today, claiming that Avast should just retire CCleaner, as the app is only a magnet for state-sponsored hackers, and that the app has no real purpose (many consider registry cleaner apps as being useless or plain harmful). While Avast refrained from attributing the attack to any threat actor, the Czech Security Information Service (BIS), the country's intelligence service, said in a press release today that Chinese hackers were behind this attack, just like in the first. The company is still investigating this second breach but said that hackers weren't successful at pushing out a malicious CCleaner release today. This was their entry point inside Avast's network. Avast said hackers compromised an employee's VPN credentials to access a temporary VPN profile that was left active and without 2FA protection.
0 Comments
Leave a Reply. |