Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
A RedBrowser Trojan is a type of Trojan horse that infects cell phones and mobile devices running Java 2 Micro Edition (J2ME). It is a real Java program known as RedBrowser, which claims that it is a Wireless Application Protocol (WAP) browser that allows users to view WAP page contents via free SMS messages.
A RedBrowser Trojan actually sends Short Message Service (SMS) messages to premium-rate Russian numbers, which can result in financial loss for the user. RedBrowser also may exploit a user’s personal information and other financial details.
A RedBrowser Trojan is also known as RedBrowser and RedBrowser.a.
RedBrowser tricks a user into giving the program permission to use a phone’s Java SMS capabilities. However, unlike custom Trojans that infect PCs, RedBrowser is a legitimate, stand-alone Java program and is installed like any other mobile program.
RedBrowser spreads via Internet download, Bluetooth sharing or PC. However, it does not infect a device automatically because to run, user permission is required. As a result, RedBrowser is classified as a low-threat Trojan. In addition, the fact that it is a real program makes it easy to remove using standard program removal tools.
RedBrowser only infects devices running J2ME, making its coverage fairly low. While the majority of older cell phone models run J2ME, most new phones use third generation (3G) wireless, versus WAP, to connect to the Internet. Smartphones use non-J2ME mobile operating systems, like Android and iOS.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
What is a Security Posture? Security posture definition refers to the ability an organization has to protect its information technology...
Trending NewsLatest GuidesReviewsTerm of the Day