ALL >> Computers >> View Article
Cybercriminals Are Attacking Smartphones With New Variants Of Trojans And Spyware
Smartphone virus attack soars as malicious programmers are always looking for new targets. Hackers are following prey onto smartphones and social networking hotspots, according to reports released Tuesday by Symantec, stated in the latest volume of its Internet Security Threat Report.
While smartphones and tablets replace PCs as the gadgets we use for messaging, Web surfing and even doing business, cybercriminals are starting to target these devices with new forms of Trojans and spyware. Cyber criminals are also ramping up the sophistication and frequency of attacks on business and government networks. Symantec also depicted a "massive" volume of more than 286 new computer threats on the Internet last year, a continued growth in attacks at online social networks and "a notable shift in focus" by hackers to mobile devices.
In recent months, smartphones running on Google-backed Android software were the target of the largest attack ever on the devices, noted a PandaLabs report. PandaLabs said "This assault was launched from malicious applications on Android Market, the official app store for the operating system,"
...
... The purpose of attacks was mostly unclear. But one app used a phone's locating software to transmit the owners' whereabouts without permission. Another was designed to quietly send repeated text messages, while charging hefty fees to the owner's wireless account. The number of threats is very small compared with the vast array of malware targeting PCs. At this moment, some experts believe it's more important for smartphone users to follow common-sense precautions than to purchase one of the commercial antivirus products now offered for mobile devices. But even though the most popular smartphone operating systems may be less vulnerable than PCs, experts say the growing popularity of mobile gadgets means malicious coders will inevitably target them more often in the future.
Studies have revealed that users are, often, unaware of the malware threat on these devices and do not feel the need to protect their phones. A survey commissioned by Slovakia-based security company ESET has found that a high number of smartphone users are at risk of losing data because of a virus attack. The research revealed that 31% of consumers do not even know their smartphone is at risk of viruses, while 14% assume security was built into the phone when they bought it.
It is expected that the number of smartphone users worldwide will exceed the one billion mark by 2013, with growth driven by ongoing competition between top tier OEMS and challengers such as Google, RIM, Apple and Microsoft, all of which are racing to create the best possible user experience at lower pricing points. Although Symbian currently leads the market, Android will become the most popular brand in the mobile OS market and is expected to attract more than half a billion users by 2015, according to the latest forecasts from Informa Telecoms & Media
Meanwhile, the number of Android users is expected to grow very rapidly thanks to the strong support by almost all major players in the mobile industry value chain – with the exception of Nokia. In fact, this platform is currently supported by some 200+ regional mobile operators and 20 top tier vendors. Today, about 100 Android smartphone models and variants have been launched worldwide, targeting different segments of the smartphone market Nine out of ten smartphone owners use the device to browse the Internet, but only 6% have antivirus installed, finds survey
Smartphone virus attacks are very common these days. The number of virus attacks is only going to increase if organizations fail to pay attention on the vulnerabilities of their mobile security. Organizations need to enforce robust information security initiatives, including having a proficiently skilled IT security workforce, in order to prevent cyber attacks and minimize security breaches. Information security professionals can increase their IT security knowledge and skills by embarking on advanced and highly technical training programs. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency of technically proficient information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography, among others. These highly sought after and lab intensive information security training courses will be offered at all EC-Council hosted conferences and events, and through specially selected authorized training centers.
About EC-COUNCIL
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 70 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 38,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.
Add Comment
Computers Articles
1. Martindale Law Firm Competitive Analysis Data For Legal IndustryAuthor: Den Rediant
2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates
3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors
4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen
5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns
6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs
7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant
8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant
9. Answering_services
Author: brainbell10
10. Api_security
Author: brainbell10
11. Appium
Author: brainbell10
12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant
13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant
14. Adobe_xd
Author: brainbell
15. Amazon Sagemaker Services
Author: brainbell10






