GAO, RSA: Malicious Mobile Apps Almost Triple - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Devices
News
9/21/2012
06:13 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

GAO, RSA: Malicious Mobile Apps Almost Triple

More cyber criminals are jumping on the mobile bandwagon, say reports from the RSA and the Government Accountability Office. As a result, companies who embrace the bring-your-own-device trend could be giving hackers access to corporate communications.

It's not surprising that lines for the latest iPhone went down the block.

Unfortunately, as more consumers choose mobile phones over PCs and laptops, cyber criminals are following right behind.

Malicious software targeting mobile devices has increased from 14,000 to 40,000 in a year, according to a new report released by the Government Accountability Office. Criminals are succeeding for myriad reasons. In addition to consumers unknowingly downloading malicious apps, many phones don't have passwords, or the two-factor authentication is misused. Operating systems are not updated, and wireless transmissions are sometimes not encrypted.

Another recent report, from RSA, said cyber criminals are less likely to write malicious code for apps in Apple's App Store because it is more regulated than Android's Google Play. According to the report, the openness of the Android app store is making "Android the most heavily-targeted mobile operating system, with Android apps by far the most widely-used vehicle for spreading mobile malware."

The BYOD trend isn't helping, either. Companies who allow employees to bring their own devices might be allowing cyber criminals to gain access to corporate communications.

One tip-off that an app is malicious, according to the RSA report, is if it requires a long list of permissions before it will install. A legitimate app usually only needs one or two permissions.

Another way criminals sneak malicious code onto a phone is by packaging their malware with legitimate apps. Consumers also should keep an eye out for apps such as SMS sniffers, said the report. These are apps that collect private SMS text messages. Another kind of malicious app, known as spyware, is used to collect personal information.

To be fair, the Android app store has several features that are helping make it more secure, said the report, such as Remote Application Removal and Google Bouncer. But as hackers do, security analysts Jon Oberheide and Charlie Miller found their way around Google Bouncer pretty easily.

Hat tip to Network World.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
AI Explosion Brewing in the Cloud for 2020
Joao-Pierre S. Ruth, Senior Writer,  1/3/2020
Commentary
Modern App Dev: An Enterprise Guide
Cathleen Gagne, Managing Editor, InformationWeek,  1/5/2020
Slideshows
9 Ways to Improve IT and Operational Efficiencies in 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/2/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll