Is mobile malware really a risk?

Following on from the Samsung Wave and HTC Magic shipping with a malware-infected microSD card, we investigate into how much of a threat mobile malware is.

"There is iPhone OS, Symbian, Windows Mobile, Android, Web OS etc. This makes it more difficult for the hackers and cyber-criminals. They have more choice, but limited resources to deploy," he said.

"They are used to the world of the PC, one very large homogeneous market that they can develop their malware for and which they can iterate, relatively easily. This is not the case with the mobile environment at the moment and this is providing an inhibitor to the wide-spread deployment of malware."

The issue of mobile malware isn't just limited to smartphones, either.

Rob Bamforth, principal analyst of Quocirca's communication, collaboration and convergence arm, said any platform can be attacked.

Advertisement - Article continues below

"Phone phreakers used to attack phone systems long before we all had personal computers or digital telephony, but the attacks on feature phone users are more likely to be social engineering (SMS fraud etc) or for those supporting Java, there's a risk there too," he said.

The problem of mobile malware will only get worse, too, because the openness of the approach allows any developers to pitch up with their app or software.

"Given the rapid development of this software and the limited barriers to entry, it poses the dilemma to determine the reputable vendor/app from the disreputable/malicious apps," Mallon added.

"There is implicit trust with open software and platforms - that everyone is altruistic and doing it for the good of the development community. However, we all know that trust can be broken and exploited."

Bamforth added: "gullibility and greed are evenly spread, so just increasing the number of smart' platforms increases the total system risk mobile malware can use social engineering attacks (phishing etc) just as easily, perhaps more easily, as in a desktop context.

"With smaller screen real estate and busy' timescales, people respond more in haste when on the move, so the risks of clicking on a link that goes somewhere bad is probably higher."

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now

Most Popular

mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
IT infrastructure

TSB payment delays suggest second IT meltdown

22 Nov 2019