123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cybercriminals Are Attacking Smartphones With New Variants Of Trojans And Spyware

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Smartphone virus attack soars as malicious programmers are always looking for new targets. Hackers are following prey onto smartphones and social networking hotspots, according to reports released Tuesday by Symantec, stated in the latest volume of its Internet Security Threat Report.
While smartphones and tablets replace PCs as the gadgets we use for messaging, Web surfing and even doing business, cybercriminals are starting to target these devices with new forms of Trojans and spyware. Cyber criminals are also ramping up the sophistication and frequency of attacks on business and government networks. Symantec also depicted a "massive" volume of more than 286 new computer threats on the Internet last year, a continued growth in attacks at online social networks and "a notable shift in focus" by hackers to mobile devices.
In recent months, smartphones running on Google-backed Android software were the target of the largest attack ever on the devices, noted a PandaLabs report. PandaLabs said "This assault was launched from malicious applications on Android Market, the official app store for the operating system,"
...
... The purpose of attacks was mostly unclear. But one app used a phone's locating software to transmit the owners' whereabouts without permission. Another was designed to quietly send repeated text messages, while charging hefty fees to the owner's wireless account. The number of threats is very small compared with the vast array of malware targeting PCs. At this moment, some experts believe it's more important for smartphone users to follow common-sense precautions than to purchase one of the commercial antivirus products now offered for mobile devices. But even though the most popular smartphone operating systems may be less vulnerable than PCs, experts say the growing popularity of mobile gadgets means malicious coders will inevitably target them more often in the future.
Studies have revealed that users are, often, unaware of the malware threat on these devices and do not feel the need to protect their phones. A survey commissioned by Slovakia-based security company ESET has found that a high number of smartphone users are at risk of losing data because of a virus attack. The research revealed that 31% of consumers do not even know their smartphone is at risk of viruses, while 14% assume security was built into the phone when they bought it.
It is expected that the number of smartphone users worldwide will exceed the one billion mark by 2013, with growth driven by ongoing competition between top tier OEMS and challengers such as Google, RIM, Apple and Microsoft, all of which are racing to create the best possible user experience at lower pricing points. Although Symbian currently leads the market, Android will become the most popular brand in the mobile OS market and is expected to attract more than half a billion users by 2015, according to the latest forecasts from Informa Telecoms & Media
Meanwhile, the number of Android users is expected to grow very rapidly thanks to the strong support by almost all major players in the mobile industry value chain – with the exception of Nokia. In fact, this platform is currently supported by some 200+ regional mobile operators and 20 top tier vendors. Today, about 100 Android smartphone models and variants have been launched worldwide, targeting different segments of the smartphone market Nine out of ten smartphone owners use the device to browse the Internet, but only 6% have antivirus installed, finds survey
Smartphone virus attacks are very common these days. The number of virus attacks is only going to increase if organizations fail to pay attention on the vulnerabilities of their mobile security. Organizations need to enforce robust information security initiatives, including having a proficiently skilled IT security workforce, in order to prevent cyber attacks and minimize security breaches. Information security professionals can increase their IT security knowledge and skills by embarking on advanced and highly technical training programs. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency of technically proficient information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography, among others. These highly sought after and lab intensive information security training courses will be offered at all EC-Council hosted conferences and events, and through specially selected authorized training centers.
About EC-COUNCIL
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 70 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 38,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.

Total Views: 423Word Count: 812See All articles From Author

Add Comment

Computers Articles

1. Start Making Your Own Ai Chatbot Today
Author: davidbeckam

2. Ai-powered Logistics: Driving The Future Of Supply Chains
Author: Trinity Diaz

3. Building A Custom Pc: Create Your Perfect Gaming And Workstation Machine
Author: PowerGpu

4. Enhancing Food Safety And Compliance With Tempgenius Restaurant Temperature Monitoring Solutions
Author: Chris Miller

5. What Is A Layer 7 Firewall And Benefits Of A Layer 7 Firewall?
Author: Robert

6. Why Investing In Professional Wordpress Development Services Is A Smart Move For Your Website
Author: Egrove Systems

7. Web Scraping Food And Beverage Inflation Data
Author: Food Data Scrape

8. Guard House Clocking Point
Author: james

9. Building Trust And Innovation In Healthcare: The Rise Of Hipaa-compliant App Development
Author: Egrove Systems

10. Why You Should Get A Technical Health Check For Your Website
Author: Mahesh

11. How To Setup Canon Pixma Ip 2770 Inkjet Printer: Full Guide
Author: theodore carter

12. Tips For Finding The Best Deals In A Cyber Ab Marketplace
Author: Ariento

13. How To Choose The Best Time To Start Test Automation?
Author: goodcoders

14. How To Choose The Best Smart Contract Platform?
Author: goodcoders

15. Best Cash Drawers For Indian Retail Stores
Author: prime poskart

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: