Thursday, April 19, 2012
Hackers thrive as handset and apps boom
Hackers thrive as handset and apps boom
Staff writer |
March 23, 2012
Telecom Asia
Mobile malware reached a new level of maturity in 2011, with threats targeting smartphones and tablets beginning to pose meaningful challenges to users, enterprises and service providers.
Juniper Networks' Mobile Threat Center (MTC) said in a new report that the boom in mobile devices and applications, both for businesses and of consumers, is also benefiting hackers. Global mobile handset shipments last year reached 1.6 billion and tablet shipments reached 66.9 million. The MTC examined 793,631 apps and vulnerabilities across every major mobile device operating system.
The "Mobile Threats" report shows that there are more attacks with ever smarter malware, largely due to the ease of unleashing them.
First, there is more mobile malware than ever before. There was a record number of mobile malware attacks last year, particularly on the Google Android platform. In the last seven months of 2011 alone, the number of malware targeting the Android platform increased by more than 34 times. The combination of Google Android's dominant market share and lack of control over the apps appearing in the various Android app stores created a perfect storm, giving malware developers the means and incentive to focus on the platform.

Overall, from 2010 to 2011, the MTC identified a 155% increase in mobile malware across all mobile device platforms. Last year, spyware and SMS Trojans comprised the vast majority of malware targeting mobile devices at 63% and 36%, respectively.
A new attack method dubbed "Fake Installers" was the fastest growing type of malware found in 2011. Fake Installers trick victims into unknowingly paying for pirated versions of popular apps that are normally free.
In addition, consumers and enterprises remain susceptible to a very low-tech risk - lost or stolen mobile devices. Nearly one in five users of Junos Pulse Mobile Security Suite required a locate command to identify the whereabouts of a mobile device.
Similar
Tata Comm withdraws from C&WW bid
NBN Co following procedure with satellite buy
What Google should do with Motorola's assets
Inmarsat, Honeywell join up for in-flight comms
Telekom Austria starts first NFC trial
Webwire: Apple wants e-book trial; Page doesn't remember Java email
Vodafone files legal notice in India tax brawl
Recent popular content
Cellcos could benefit from tie-ups with handset insurers
Cloud Focus
Tekelec's Boudewijn Pesch talks about how collaboration with partners is driving open systems with the help of policy control and routing