Lasco.A can spread through shared programs or through Bluetooth connectivity.
The emerging security threat to mobile smart phones grew more hostile this week after a security firm spotted a multifaceted computer worm. The worm, dubbed Lasco.A, attempts to infect certain phones running the Symbian operating system, antivirus firm F-Secure said Monday.
Lasco.A spreads by searching for all SIS installation files on an infected phone and embedding itself within the files, according to a security notice published by F-Secure. That means that as users trade programs, they'll spread the worm. Lasco.A also tries to infect phones that have Bluetooth connectivity enabled.
Malicious code threats which target mobile phones have been theoretical for years, until recent months. In November and December, several variants of the Skulls cell-phone Trojan and the Cabir Bluetooth worm surfaced. Antivirus companies said they received some reports of infections.
Most antivirus companies that offer protection for mobile phones offer protection against Lasco.A, or will soon. Security experts suggest those with Bluetooth-enabled phones not leave them on in "discoverable" mode.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.