5 Ways To Fight Mobile Malware - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile

5 Ways To Fight Mobile Malware

A new Android Trojan reminds us of the growing threat to mobile devices. Follow these five simple security tips to protect your smartphones and tablets from mobile malware.

Android Trojan App Seeks Full Access
(click image for larger view)
Android Trojan App Seeks Full Access
A new Trojan horse app has emerged to target Android devices, and this one's particularly creepy. The app records a user's phone calls and then uploads them to a remote server. The app was revealed Tuesday by security researcher Dinesh Venkatesan on the Security Advisor Research Blog, published by CA Technologies, now known as Total Defense. While this particular Trojan doesn't appear to be a threat in the wild--at least not for North American users--it's a good reminder of the growing threat of mobile malware.

New smartphone malware emerges on a weekly--sometimes daily--basis of late, though most users have yet to take the threat as seriously as PC-based malware. But according to Robert Vamosi, senior analyst at device security company Mocana and author of When Gadgets Betray Us, we should be increasingly concerned about the threat of mobile malware.

"There are more mobile devices today than there were PCs connected to the Internet in 1996," Vamosi said in an interview. "Cybercriminals are realizing that, unlike PCs, mobile devices aren't very well secured."

In addition to outright malware, there are other ways that mobile devices can put your secure information at risk. "Smartphone users should indeed have a certain level of concern, or at least a security conscious mindset, when it comes to mobile malware," according to Jeffrey Wilhelm, senior analyst at Symantec Security Response. "That said, there are still other threats facing mobile device users that are a bigger concern than mobile malware, namely the loss or theft of a device."

Just like a malware-infected phone, an unsecured device can be a serious liability if it's lost or stolen. A thief or ill-intentioned finder can access personal contacts, email, and--quite often--social networking accounts and even online banking resources.

Fortunately, there are some simple steps anyone can take to protect their phones and tablets from the growing threat of malware and the persistent threat of unsecured devices. Here are five easy steps you should take to secure your own devices, and share with the mobile users you know.

1. Lock Your Phone

This should seem like a pretty obvious tip, but clearly most people need a good reminder, since the majority of smartphone users don't lock their phones at all. Putting a simple passcode on your phone is the first step--and could be the only step required--in protecting a device when it goes missing. But if a ne'er-do-well gets his hands on a phone with no passcode, as Symantec's Wilhelm pointed out, that's as good as an invitation to identity theft.

2. Use Only Well-Known App Markets

The most significant security factor that should give Android users pause, said Vamosi of Mocana, is that "Android users can download apps from third-party sites not Google whereas iPhone users can only download from the App Store." So it's especially important to download apps from sources that are known for good security.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
White Papers
Register for InformationWeek Newsletters
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
Slideshows
Flash Poll