SCF Advanced Search



Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43455
  • Total Topics: 16546
  • Online today: 2844
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2842
Total: 2843









Author Topic: Mobile Malware: What Happens Next?  (Read 5114 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7529
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Mobile Malware: What Happens Next?
« on: 13. November 2008., 20:56:09 »


Four years ago, F-Secure Chief Research Officer Mikko Hypponen was talking about malware infections on mobile phones while few others were paying attention. With the growing use of Internet-enabled phones, particularly Apple's iPhone and RIM's Blackberry, he sees more opportunities than ever for malicious activity. But, surprisingly, he sees a quiet mobile malware landscape at the moment.

"It's quite quiet on the mobile side. We now have over 400 known mobile phone viruses and Trojans, but most of those target the older smartphone systems," he says. "Most of the current systems have improved built-in security."

Hypponen believes the most likely mobile risk today isn't mobile viruses or Trojans, but mobile spying tools like FlexiSpy, Neocall or Mobile Spy. These commercial tools run fine even on the latest versions of Symbian, Windows Mobile or Blackberries, he says.

Meanwhile, iPhone has been the target of some attacks, but it still has a miniscule market share globally compared to the big boys like Nokia. That means a smaller bull's-eye. But as that market share increases, he expects more attacks to materialize.

In the short term, Hypponen is looking at some of the more notable events of 2008 for clues on what will happen in 2009.

"The defining moment in 2008 was the change from smtp to http," he says. "Now the miscreants' preferred way of infecting net users is no longer e-mail, but Web-based drive-by-downloads. Today you're more likely to get infected by surfing the Web than reading your e-mail."

The explosion of malicious SQL injection attacks on trusted websites, combined with the mass creation of new malicious websites means that in 2008 the Internet was more dangerous than at any other time in the past, he says.

"Also to be noted, many of the attack-in-depth attacks being deployed from these sites don't just target vulnerabilities in the operating system or the browser, but increasingly they target vulnerabilities in browser plug-ins and add-ons - which people rarely Update," he says.

Andrew Storms, director of information technology at nCircle Network Security, is more convinced that bigger phone-based threats are around the corner. One of the biggest shifts in the threat landscape is the proliferation of iPhones and Blackberries -- devices that are already almost as ubiquitous as laptops. With Google Android entering the scene, he worries the problem is just going to become more complex.

"The biggest consequence of the proliferation of mobile devices is that enterprise data is more and more dispersed, but the IT and security teams have no eyes or ears for these devices," he says. "Already security professionals are struggling to keep their customers productive in an environment where gadget makers have failed to keep up with the fast-moving security threatscape. IT teams would like to treat these devices as laptops but many of the tools don't translate directly to smart phones."

Sensitive corporate data on smart phones will probably draw only a small number of very targeted attacks; but it only makes sense that security pros expect attack trends on mobile devices to mirror trends for all other computing environments, he says. Ultimately, the biggest threats will probably be targeted at the treasure trove of personal information stored on a smart phone.

"No one should be surprised if we see the first major threat of the migration of botnets from traditional computing devices to mobile platforms," Storms says. "Some smart phones already have more memory and higher processing power than laptops from just a few years ago. A constantly moving and adapting mobile botnet presents a compelling business proposition for hackers and an interesting real-world case study in chaos theory."

(PC World)

Samker's Computer Forum - SCforum.info

Mobile Malware: What Happens Next?
« on: 13. November 2008., 20:56:09 »

jake2pointzero

  • SCF Member
  • **
  • Posts: 53
  • KARMA: 6
Re: Mobile Malware: What Happens Next?
« Reply #1 on: 05. March 2009., 20:52:03 »
I think those with advance Mobile Phone is prone to this threat. Since my mobile phone is a bit jurrasic nothing to worry.

Samker

  • SCF Administrator
  • *****
  • Posts: 7529
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Re: Mobile Malware: What Happens Next?
« Reply #2 on: 06. March 2009., 16:13:01 »
I think those with advance Mobile Phone is prone to this threat. Since my mobile phone is a bit jurrasic nothing to worry.

 :D  :D   :D

you only need to worry about protection from water...




Samker's Computer Forum - SCforum.info

Re: Mobile Malware: What Happens Next?
« Reply #2 on: 06. March 2009., 16:13:01 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023