New apps are coming out everyday, and it can be tricky to monitor which ones help citizens and which take advantage of them.

Malicious apps can be disguised as regular ones, like a game or file manager. While running in the background, they can steal passwords and emails. They could even activate the phone’s microphone and listen in to conversations.

A report by Check Point shows what kind of attacks are common on smartphones. It details how attackers can take control of the phone, what damage it can cause and how it can be detected and prevented.

Download this report to find out more from Check Point on this topic.

Image by michael davis-burchat, licensed under CC BY-ND 2.0