Malware on other mobile platforms is exceedingly rare, but on Android it is becoming common. The most interesting news from the report, which AVG bases on threats encountered by its anti-virus software on customers' computers, is the rise of "bootkits." Bootkits are analogous to rootkits on desktop computers. Android is based on a pared-down Linux kernel. A bootkit is a program that modifies and injects itself into that kernel. The malicious code therefore is always running on the phone; the user doesn't have to load an app. Like a rootkit it can do almost anything it wants, including intercepting information being sent from the operating system to apps and modifying it. It could, for example, change the numbers being displayed by your bank app.
Android bootkits aren't that sophisticated yet. AVG says that attacks still consist mostly of using premium SMS numbers to make money for the attackers. The numbers of such attacks are increasing, though, and are now increasingly based on more powerful techniques, such as the bootkit, which enable more sophisticated exploits.
The other big but not surprising news is the continued geographical concentration of Android malware in China and other far-eastern countries. Third-party app stores are more popular in these countries and malware has made its way into these stores more easily than it has in the official Google Play store.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.