Tuesday, 9 August 2011

Mobile Malware: be Prepared against the growing threats

Android users are now 2 1/2 times more likely to encounter malware than a mere six months ago, a report finds.
As the capabilities, programmability, and "attack surface" of mobile devices mirror that of PCs, so too do the threats. A  report from Lookout Mobile Security, a provider of mobile security software Lookout calls "repackaging." Like all Trojans, this technique is particularly effective since most users configure their devices to automatically update installed apps. Although malicious Android apps are the focus of Lookout's report, iOS owners are not exception. Despite the sophistication of existing mobile malware exploits and distribution techniques, the people at Lookout believe this is just the beginning. Specifically, they see mobile malware being used to set up botnets, exploit mobile finance and payment systems, and abuse premium-rate text messages (essentially SMS 900-numbers). So what's a smartphone user to do? A good start is applying some of that home PC knowledge to your mobile device usage. 
MOBILE THREATS
As with PCs, there are a variety of security threats that can affect mobile devices. We split mobile threats into several categories: application-based threats, web-based threats, network-based threats and physical threats.
Application-based Threats
Downloadable applications present many security issues on mobile devices, including both software specifically designed to be malicious as well as software that can be exploited for malicious purposes. MALWARE is software that is designed to engage in malicious behavior on a device. Data commonly targeted by spyware includes phone call history, text messages, location, browser history, contact list, email, and camera pictures. VULNERABLE APPLICATIONS contain software vulnerabilities that can be exploited for malicious purposes.
Web-based Threats
DRIVE-BY-DOWNLOADS automatically begin downloading an application when a user visits a web page. Simply by visiting a web page, an unsuspecting user can trigger a browser exploit that can install malware or perform other actions on a device.
Network Threats
Mobile devices typically support cellular networks as well as local wireless networks.
Physical Threats
LOST OR STOLEN DEVICES are one of the most prevalent mobile threats.
Mobile security issues are present on all major mobile platforms, though threats affect each platform differently. Application-based threats affect both iOS and Android. Currently, malware and spyware have primarily targeted Android devices, though there are commercial spyware applications available for jailbroken iOS devices.


How to Fight Mobile Malware      

            1.Lock your phone
Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.
2. Use Only Well-Known App Markets
Adjusting your Android device's settings to block app downloads from sources other than the Android Market. Also disable auto update feature from every application.
3. Examine Every App Download
Regardless of whether an app is free or paid, any given download is a potential threat to your phone's security. Take the time to examine each app's market listing carefully before downloading it to your device. Remember to look at the developer name, reviews, and star ratings.
4. Beware Strange Texts and Emails
Just like emails, attackers can use text messages to spread malware, phishing scams and other threats among mobile device users.

5. Use Mobile Security Software
As the threat from mobile malware has grown, so has the number of good security offerings in the marketplace. Use one. There are several comprehensive device security apps in the Android Market that can help detect and protect against mobile malware, and it's increasingly wise to use one.
Read  here  Lookout Mobile Threat Report for August 2011  .

No comments:

Post a Comment