Article Writing Homework Help
Write 2 pages with APA style on Evaluation of Source: Windows Malware tries to Infect Android devices Connected to PCs.
Write 2 pages with APA style on Evaluation of Source: Windows Malware tries to Infect Android devices Connected to PCs. Source Evaluation Source: “Windows Malware tries to Infect Android devices Connected to PCs” Computer and mobile technology has continued to grow and it appears that the best is not yet to be. While technologists and experts are busy developing new products as well as innovating the preexisting ones, there are the malicious ones who have gone ahead to develop programs that have the capability to corrupt these systems to the extent that they are destroyed. Development of viruses and malwares has been on the rise. Through my research, I came across one article by Lucian Constantin that was posted in the Computerworld website. This article was posted on January 23, 2014. it features the discovery of a Windows Trojan program that infected Android devices connected to PCs by Symantec researchers. This article provides insight on various aspects that are mind opening and are verifiable. The article “Windows Malware tries to Infect Android devices Connected to PCs” is current, authentic and is backed up by research. therefore, it can be used for my research.
This source outstands from the rest in various aspects. Firstly, having been written in the year 2014, the article provides some of the most recent information about the malware technologies. Secondly, the article is presented in a form that is meant to attract professionals in this field. Otherwise, a layman may read the article but they may not fully understand the concepts and terms that have been used in the article. This sets the article apart from any other article related to such a topic, for example.
“The Trojan program downloads the malicious APK, as well as the Android Debug Bridge (ADB) command line tool that allows users to execute commands on Android devices connected to a PC. ADB is part of the official Android software development kit (SDK) (Constantin 1).
Such a statement is very technical language. it requires an individual who is conversant with the field to understand what the author is up to.
The authenticity of this article is enhanced by the research done by Symantec. This research gives the article the weight to be used in any research work. However, the information is not peer reviewed and cannot be used for scholarly works. The article features quotes from some of the researchers. Flora Liu, one of the researchers at Symantec points out that, “interestingly, we recently came across something that works the other way round, a windows threat that attempts to infect android devices” (Constantin 1). In the quote Liu was pointing out that despite in the past having devices infect the PC, the scenario has changed, the malware is capable of infecting android PCs.
In this article, the writer is very systematic in the approach that they use. She begins by giving a general overview of the discussion and the basis thereof. She begins with a statement that is well aligned with the topic as well as the discussion topic. She then goes further to elaborate by providing resources including a blog post that one of the researchers, Flora Liu made some of the sentiments presented in the article. She goes on to explain more about Trojan.Droidpak and the mechanism in which it infects android devices from a PC. To affirm her statements she quotes Liu severally and concludes the article by mentioning the advice that Liu gave to users in order to prevent the threat.
This source provides very beneficial information in a very professional manner. It provides a stepwise description of the mechanisms behind the newly found malware. While it is not possible to use the source for scholarly work, it provides a very important background as well as providing some of the latest developments in the industry.
Works Cited
Constantin, Lucian. Windows malware tries to Infect Android Devices connected to PCs. Jan 23, 2014. Web. Feb 12, 2014. http://www.computerworld.