Destructive power of mobile viruses could rise fast, experts say
IDG News Service - SINGAPORE -- The dream of a connected world where PCs and mobile phones can communicate with the digital home and other devices is supposed to make life easier. But it could instead make life far more dangerous if malware developers have their way.
And it's not just the possibility of losing a credit card number. With microchips and software becoming more a part of life, such as in cars, homes and mobile phones, the threats multiply dramatically.
Simple programs available already could be a good start. Mobile phone services in some countries allow people to view what's going on inside their house during the day via a Web cam connected to motion sensors. The Web cam can snap a picture and send it to the user if anything seems awry.
But that same Web cam could be used by a hacker to see if anyone's home. If nobody's in, it may be a good time to break in. Or, a hacker could use the Web cam to take pictures of what's going on in the house, invading privacy. In a more ominous example, what if someone could hack into a user's mobile phone while they're driving and use it to shut down certain automobile systems, like the brakes?
Scenarios like these are becoming increasingly possible as more gadgets, such as mobile phones, become connected to the Internet, said Dhillon Kannabhiran, founder of the Hack in the Box Security Conference being held in Kuala Lumpur, Malaysia, this week.
Part of the problem is that stronger security in personal computers and on servers has made it more difficult to attack such devices.
"These kinds of exploits are getting fewer and far between, so people are looking for new platforms to attack," said Kannabhiran, adding that hackers will take far greater interest in 3G (third-generation) phones because being connected to the Internet all the time makes them more accessible.
The threat of malware attacks on mobile phones has already increased dramatically over the past year as smarter phones that use more software allow Internet surfing and act as personal digital assistants gain popularity.
"Vendors are concerned with the alarming rate smart phone viruses are starting to come out now," said Anthony James, senior product manager at security specialist Fortinet Inc., in an interview.
F-Secure Corp., another antivirus software vendor, says the current total count of known mobile malware stands at 87, up from less than 10 early last year. A total of 82 of those viruses were written to run on the Symbian series 60 operating system.
Symbian is the world's most popular
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts