When it comes to talking about the most popular applications in catalogs and the possible threats that operating systems face, we mention that these tools that have revolutionized the use of tablets and smartphones, as well as consumer electronics, can have several drawbacks that can cause major problems for both devices and users. Hackers can use them to introduce malware and harmful elements of all kinds that are sometimes very well camouflaged or can appear innocuous, which makes their detection and elimination even more difficult if they attack the terminals and enter them.
Today, we will give you a series of simple tips and based on common sense that can be very useful to know how to intercept those apps that are not entirely safe. At the same time, we will tell you what may be some indicators that can show that these products are fraudulent and finally, we will give you a small list of some of the most damaging for both Android and Windows. Did you know that the green robot software has the largest number of counterfeit applications and that old versions of Microsoft software received a lot of criticism for their vulnerabilities?

Control permissions
Currently, an increasing number of apps require a series of permissions such as the location, the contacts in the calendars or even the contents hosted by the batteries. In the latest versions of Android we can control what information of this type we offer when downloading new tools. If among the elements that demand, we find the possibility of change some features like fondos screen, themes, or access and even reading of messages and records of calls, we must distrust.
Opinions and valuation, crucial
In many applications we can find a series of positive opinions that can be generated by users related to the developers or companies that have created these tools. However, through the evaluations we can also find a series of very faithful indicators about the true performance of the apps we download and some mean scores which also reflect all comments good and bad that have generated them. Using common sense, if one has not been entirely well received, we must desist from it.

The description, another key
In many cases, we find products whose characteristics are detailed in a very simple way and which also have serious writing errors, grammatical mistakes and lack of coherence. If we add to this that they are written in languages ​​other than English or Spanish, we have a series of more indicators that show us that it is an application that should be mistrusted. If, in addition, we do not have any more data that reveals where it comes from, the most appropriate thing is not to access it.
Know where it comes from
Finally, we finish with a piece of advice that we have already given you repeatedly when it comes to telling you more about viruses and malware of all kinds: The origin of apps. In all of them it should appear who has been the entity that created it. If we have any doubts about its origin, it is best to search the Internet to find more opinions and information as truthful as possible about its designers. On the other hand, if they come from featured developers backed by the same catalogs and operating systems, we will have added value that will allow us to feel somewhat more secure.

Examples
Next, as we mentioned at the beginning, we will show you some examples of apps that can be harmful and that have already been reported by thousands of users around the world. In addition to this small list, as always we recommend having a good antivirus and adequate protection not only against them, but also to have an even safer user experience when using the most popular ones such as Facebook, Twitter, WhatsApp and many more. Although some of them have been eliminated, at first glance, they may have survived under other names.
1.InstaG
We started with a photographic platform whose name may be very reminiscent of the famous network Instagram. The most dangerous thing about InstaG is the amount of permissions it requires to function and that we mentioned before, such as the photos and videos saved.

2.Windows Live Hotmail
Second, we find another that can perfectly pass through Microsoft's mail tool but that nevertheless only shares with this part of its name. Through it, it is not only possible to receive a large amount of spam, but also, being victims of the theft of sensitive information.
3.Clans of Clash
We have all come across games inspired by those that have broken download records that try to emulate the latter and that practically copy their name. In these cases, you have to be very cautious since titles like Clans of Clash can hide integrated shopping very high and once again, the demand for greater control over the terminals.
4.Brain Test
Although Google Play ensures that this app was eliminated, we introduce it in this ranking as an example of how the ratings can be highly conditioned. In the case of this game that promised to train our mind, the download figures and the opinions of its creators were falsified, who introduced a malware that stole personal data.

5.FoxIt Mobile
We ended up with a tool focused on productivity that at first glance, allowed convert to PDF any type of text on our tablets and smartphones and view them without problems. The biggest drawback of this platform is the fact that it had a series of vulnerabilities that made it a back door for viruses, especially on Android.
As you have seen, there are many indicators that can show us the security of the apps we use. You have more related information available, such as a series of tricks to remove all malicious elements from devices if they appear.