From: <Сохранено Windows Internet Explorer 8> Subject: =?windows-1251?Q?IDG_Connect_=96_The_Growth_in_Mobile_Malware?= Date: Fri, 27 Sep 2013 14:53:46 +0400 MIME-Version: 1.0 Content-Type: multipart/related; type="text/html"; boundary="----=_NextPart_000_0000_01CEBB91.5E798F80" X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6157 This is a multi-part message in MIME format. ------=_NextPart_000_0000_01CEBB91.5E798F80 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable Content-Location: http://www.idgconnect.com/blog-abstract/3676/the-growth-mobile-malware =EF=BB=BF
Posted by David=20 Emm
Mobile malware has been around for some years, but it's only in the = last=20 couple of years or so that we've seen it emerge from the = 'proof-of-concept'=20 stage to being a tool in the hands of cybercriminals, i.e. to make money = illegally.
The huge growth in mobile malware is a result of a number of = different=20 factors. First, the huge numbers of smartphones being used; second, the = variety=20 of =E2=80=98interesting=E2=80=99 data now stored on these devices, such = as: contacts,=20 photographs, SMS messages, banking credentials and social networking = logins; and=20 finally, the growing use of mobile devices in business and the lack of = awareness=20 from organisations around mobile threats. In a survey we commissioned last year, only 55% of = businesses=20 considered mobile devices in the workplace a serious threat.
The varieties of mobile malware
The types of malware we're now seeing and how these work include:
Securing mobile data
While mobile malware is growing in volume and sophistication, this is = only=20 part of the picture. Increasing amounts of data are being stored on = mobile=20 devices - including confidential business data. However, devices = are often=20 unprotected with a PIN and the data stored on them is seldom = encrypted. At=20 the same time, these devices are easy to lose and easier to steal, so = there's an=20 increasing risk of data leakage.
The task of securing data has become harder for businesses as = employees=20 increasingly conduct business outside the traditional work place - i.e. = at home,=20 at the airport, in a hotel, etc. There's a heterogeneous mix of = endpoint=20 devices, they are harder to manage because they're geographically=20 distributed. So businesses not only face the growing threat from = mobile=20 malware, but also the risk of data leakage.
The future of Mobile Malware
The growth of mobile malware is only going to continue as people = increasingly=20 conduct business and sensitive transactions via mobile=20 devices. Cybercriminals follow the money and as mobile banking and = shopping=20 continue to increase in popularity, so will the threats targeting these=20 devices. However, it=E2=80=99s not just financial data = that=E2=80=99s a key target, but=20 also lots of personal data that can be harvested and used to frame = targeted=20 attacks.
At a societal level, there are a number of factors that can help = combat the=20 increase in mobile malware. This includes the development of a = legislative=20 framework to deal with cybercriminals (in the UK we have well-developed=20 legislation, but that=E2=80=99s not true of all regions of the world), = cross-border=20 co-operation of law enforcement agencies, and market regulation (e.g. = it=E2=80=99s=20 harder to set up an affiliate network that will allow successful = monetisation of=20 SMS-Trojans in the UK compared to Russia, China and other = areas).
In regards to businesses, organisations need to ensure they include = mobile=20 devices in their security strategy and deploy appropriate technology. = This=20 includes anti-malware, whitelisting, encryption, centralised policy = management=20 and enclosing of personal and business data (a result of the BYOD=20 trend). It=E2=80=99s also not just the threat of malware on the = device, but the=20 network itself, as shown by the discovery of =E2=80=98Red = October=E2=80=99 =E2=80=93 a targeted attack=20 that specifically harvested data from devices connected to the network = of victim=20 organisations.
David Emm is Senior Security Researcher at Kaspersky Lab
PREVIOUS ARTICLE
=C2=ABThe=20 Continuing Problem of Online PrivacyNEXT ARTICLE
Bangalore:=20 Products vs. Services?=C2=BB =Date: Wednesday, August 14, 2013, 2:00 PM EDT Companies have to be = prepared=20 to support the new mobile workplace or risk falling behind. But =
The best IT solution for mobile content security is to be strict = where=20 necessary and lenient elsewhere, ensuring that confidential data is far = less=20
Thanks all for your comments. Both views are equally strong. A = discussion=20 that results in a call to action is most important. =
i have chromecast running on a new install of ubuntu 12.04 with = chromium=20 browser on an asus netbook. its isnt supported but it works. i have... =
Cary on 7=20 Google Chromecast Limitations All Potential Buyers Should Consider =
That is great ! What we have is a mix and match of existing poor = quality=20 products and this seems like a neat application replacement. I am a... =
Vincent Mascarenhas on Box=20 CEO Aaron Levie: Disrupting the Enterprise
Enterprise Resource Planning = (ERP)
If your company has an = ERP selection and implementation...
Download ContentEnterprise Resource = Management
This paper can = help you choose the right ERP solution,...
Download ContentEnterprise Resource Planning = (ERP)
If you=E2=80=99re = looking for your first ERP system or looking...
Download ContentThis white paper = from Fifth Quadrant outlines 4 key...
Download ContentLearn how high = value requirements are changing app...
Download ContentProject Management = Solutions
This paper = discusses how the combination of collaboration,...
Download ContentIn this = whitepaper, requirements expert Karl Wiegers...
Download ContentProject Management and = Collaboration
In this paper, = our goals are to demystify traceability...
Download ContentProject Management and = Collaboration
Wish someone = would explain requirements management...
Download ContentProject Management and = Collaboration
Read this = paper to learn about the top 5 frustrations...
Download ContentQwerty vs. touch screen =E2=80=93 do mobile business users need a = proper keyboard?=20
Comments