The\u00a0first of two-part series discussing malware on smartphones.<\/em><\/p>\n
Malware is short for \u201cmalicious software<\/em>\u201d, and according to Wikipedia<\/a>, it is software<\/p>\n
Malware includes computer viruses<\/a>, worms<\/a>, trojan horses<\/a>, spyware<\/a>, adware<\/a>, and other malicious programs\u2026<\/em><\/p><\/blockquote>\n
<\/a>According to the 2011 Mobile Threats Report<\/a>\u00a0published by Juniper Networks Mobile Threat Center, there was 155% increase in malware attacks across all platforms. Additionally, the firm was of the view that this growth is indicative of a maturing ecosystem evidenced by:<\/p>\n
\n
- the unprecedented number of malware attacks experienced in 2011<\/li>\n
- the fact that smartphone\u00a0malware has become more sophisticated, and is not just exploiting technical vulnerabilities, but also social engineering and human behaviour<\/li>\n
- the \u2018low barrier to entry\u2019 to accessing smartphone\u00a0applications, which is being fostered\u00a0by users\u2019 desire for those products, as well as an ever-growing\u00a0apps market, which is not only fuelling the apps industry, but also the development of malicious programmes.<\/li>\n<\/ul>\n
Which platform is the most vulnerable?<\/h3>\n
Most recent threat reports published by a several well-regarded security experts unanimously confirm that malware attacks against smartphones using the Android Operating System (OS) have increased considerably over the past few years. The Juniper 2011 report<\/a>\u00a0highlighted that in a sample of over 790,000 applications, the number of Android Malware grew from \u2018roughly 400 samples in June to over 13,000 samples by the end of 2011<\/em>\u2019. Similarly, the Sophos Security Threat Report 2013,<\/a>\u00a0noted the following:<\/p>\n
What are some of the top smartphone malware?<\/h3>\n
Outlined below are just a few of the most reported threats to smartphones, and specifically Android devices. These examples should highlight how seemingly innocuous some of the malware might initially appear, or the ways in which they attempt to capitalise on our opportunistic nature.<\/p>\n
\n
- Gemini<\/strong>.\u00a0Gemini is a\u00a0Trojan that opens a back door and transmits information from an Android device to a remote location (Source: Symantec<\/a>). It is also one of the first Android malware that displays botnet-like capabilities, i.e. once the malware is installed on a user\u2019s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone (Source: Lookout Mobile Security<\/a>).
<\/a><\/li>\n
- GGTracker<\/strong>.\u00a0 A Trojan that targets the US market, and is automatically downloaded to a user\u2019s phone after visiting a malicious webpage that imitates the Android Market (now Google Play<\/a>). \u00a0GGTracker is able to sign-up users to a number of premium SMS subscription services without their consent, which can lead to unauthorized charges on their phone bills (Source: Lookout Mobile Security<\/a>).<\/li>\n
- Loozfon<\/strong>: This\u00a0low-risk malware is a Trojan horse for Android smartphones that steals information from compromised devices (Source: Symantec<\/a>). Typically, it uses\u00a0a bogus claims, e.g.\u00a0work-at-home opportunity promising a profitable payments just for sending emails. If users click on the link in one of these advertisements, they are directed\u00a0to websites that are designed\u00a0to push Loozfon\u00a0onto their devices,\u00a0and may attempt to steal your address book contacts (Source: Forbes<\/a>).<\/li>\n
- FinFisher<\/strong>: This spyware\u00a0downloaded onto\u00a0your smartphone\u00a0when users visit\u00a0a specific web link or open a text message disguised as a system update, When FinFisher\u00a0is installed\u00a0, it can remotely control and monitor users’ communications (Source: Forbes<\/a>).<\/li>\n<\/ul>\n
<\/p>\n
Image credits:\u00a0 Lascoo.co.nz<\/a>;\u00a0 Victor Habbick<\/a> (FreeDigitalPhotos.net)<\/em><\/p>\n
___________<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"