Mobile // Mobile Devices
06:13 PM
Connect Directly

GAO, RSA: Malicious Mobile Apps Almost Triple

More cyber criminals are jumping on the mobile bandwagon, say reports from the RSA and the Government Accountability Office. As a result, companies who embrace the bring-your-own-device trend could be giving hackers access to corporate communications.

It's not surprising that lines for the latest iPhone went down the block.

Unfortunately, as more consumers choose mobile phones over PCs and laptops, cyber criminals are following right behind.

Malicious software targeting mobile devices has increased from 14,000 to 40,000 in a year, according to a new report released by the Government Accountability Office. Criminals are succeeding for myriad reasons. In addition to consumers unknowingly downloading malicious apps, many phones don't have passwords, or the two-factor authentication is misused. Operating systems are not updated, and wireless transmissions are sometimes not encrypted.

Another recent report, from RSA, said cyber criminals are less likely to write malicious code for apps in Apple's App Store because it is more regulated than Android's Google Play. According to the report, the openness of the Android app store is making "Android the most heavily-targeted mobile operating system, with Android apps by far the most widely-used vehicle for spreading mobile malware."

The BYOD trend isn't helping, either. Companies who allow employees to bring their own devices might be allowing cyber criminals to gain access to corporate communications.

One tip-off that an app is malicious, according to the RSA report, is if it requires a long list of permissions before it will install. A legitimate app usually only needs one or two permissions.

Another way criminals sneak malicious code onto a phone is by packaging their malware with legitimate apps. Consumers also should keep an eye out for apps such as SMS sniffers, said the report. These are apps that collect private SMS text messages. Another kind of malicious app, known as spyware, is used to collect personal information.

To be fair, the Android app store has several features that are helping make it more secure, said the report, such as Remote Application Removal and Google Bouncer. But as hackers do, security analysts Jon Oberheide and Charlie Miller found their way around Google Bouncer pretty easily.

Hat tip to Network World.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Building A Mobile Business Mindset
Building A Mobile Business Mindset
Among 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of October 9, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll