Criminals aim at mobile phone banking

Cyber criminals increasingly attacking mobile phone banking and payment services, report finds.

Criminal gangs have users of mobile phone banking services in their sights, according to a new report.

Research by analysts The Tower Group, predicts that this year will see fraudsters increasingly targeting banking and payment services on mobile phones with the goal of infecting or compromising a mobile device in order to steal money from unsuspecting users.

The analysts said that targets would be most likely to be a smartphone or wireless PDA that can act as a replacement for a credit or debit card.

It warned that current initiatives from the financial industry lack "a reasonable and justifiable focus on mobile malware."

"The success mobile banking and payments, as well as the concept of the mobile wallet, will be measured against the industry's ability to effectively contain the malware problems to a level that is at least on par with that of the existing internet channel," said Bob Egan, Chief Analyst at TowerGroup and author of the research.

Egan said that over 200 mobile viruses have already been identified and that number is doubling nearly every six months.

"Now is the time for IT managers and line of business heads within institutions to take action to protect both their companies and customers from mobile malware."

According to the report, complexities surrounding mobile security, including identity theft, consumer privacy and fraud, are exponentially increasing.

"IT managers must examine extending their existing malware and virus security initiatives to include mobile phones," said Egan. "Likewise, the mobile commerce industry beyond financial services players must step up to take more aggressive and immediate actions to circumvent the potential of fraud and theft."

The report recommended that IT managers take steps to combat the mobile virus threat by creating enforceable policies around the use of business mobile phones and list what types of mobile applications can be downloaded. It also urged companies to require mobile phone operators to install and monitor mobile safeguards.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021