Thursday, January 2, 2014


Mobile malware has emerged as a real and significant problem. Addressing it is no longer optional. As with other IT security risks, technology isn’t a silver bullet, but it is a key component of a holistic solution that also incorporates people and process.

A mobile virus is malicious software that targets mobile phones or wireless-enabled PDAs,thereby may causing the collapse of system and loss or leak of confidential information.The insidious objectives of mobile malware range from spying to keylogging, from text messaging to phishing, from unwanted marketing to outright fraud.

Fifty-nine percent of IT and security professionals surveyed by the Ponemon Institute recently said mobile devices are increasing the prevalence of malware infections within their organizations. This is no shock: the extraordinary growth of mobile platforms has madethem an irresistible target. The only surprise would have been if these devices had escaped attack.

Years ago, PC malware exploded when Windows achieved dominance. Something similar
is occurring with mobile. As the mobile marketplace has grown and evolved, the Android platform has become dominant. Worldwide, 70% of new smartphones now run Android, with iOS running a distant second. (Microsoft’s Windows Phone 8 platform offers promise, but hasn’t yet achieved significant market penetration.)

The Android platform’s openness has made it attractive to users, device manufacturers,carriers, app developers and to malware creators. That’s where they’re focused..

In BYOD arrangements, mobile devices are often owned by users, who act as defacto administrators. Users typically decide which apps to run, and where to get them.Wider smartphone and tablet usage is often correlated with a loss of organizational control.And that, in turn, can compromise security in multiple ways. This is why some organizations are pursuing choose your own device (CYOD) approaches, where users get to pick their devices from a list the company is prepared to support, will continue to own, and plans to centrally administer. Of course, CYOD isn’t always an option, and many organizations have chosen to accept the tradeoffs associated with full BYOD.

Mobile malware risks
Organizations evaluating mobile malware risks should assess each of the ways it can damage them, including the following.

Productivity losses: Some forms of malware inconvenience users through aggressive advertising, prevent mobile devices from working properly, and increase support costs.

Direct costs: Some forms of malware and potentially unwanted applications (PUAs) have direct costs by utilizing paid mobile services such as SMS, with or without the user’s awareness or understanding.

Security, privacy, and compliance risks: Mobile malware can compromise corporate and customer data, systems, and assets that must be protected—placing the organization at competitive, reputational and legal risk.

Some mobile malware and PUAs merely annoy and frustrate. Yet as a whole, mobile malware and PUAs represent a significant and growing problem.

No comments:

Post a Comment