ALL >> Computers >> View Article
Cybercriminals Are Attacking Smartphones With New Variants Of Trojans And Spyware

Smartphone virus attack soars as malicious programmers are always looking for new targets. Hackers are following prey onto smartphones and social networking hotspots, according to reports released Tuesday by Symantec, stated in the latest volume of its Internet Security Threat Report.
While smartphones and tablets replace PCs as the gadgets we use for messaging, Web surfing and even doing business, cybercriminals are starting to target these devices with new forms of Trojans and spyware. Cyber criminals are also ramping up the sophistication and frequency of attacks on business and government networks. Symantec also depicted a "massive" volume of more than 286 new computer threats on the Internet last year, a continued growth in attacks at online social networks and "a notable shift in focus" by hackers to mobile devices.
In recent months, smartphones running on Google-backed Android software were the target of the largest attack ever on the devices, noted a PandaLabs report. PandaLabs said "This assault was launched from malicious applications on Android Market, the official app store for the operating system,"
...
... The purpose of attacks was mostly unclear. But one app used a phone's locating software to transmit the owners' whereabouts without permission. Another was designed to quietly send repeated text messages, while charging hefty fees to the owner's wireless account. The number of threats is very small compared with the vast array of malware targeting PCs. At this moment, some experts believe it's more important for smartphone users to follow common-sense precautions than to purchase one of the commercial antivirus products now offered for mobile devices. But even though the most popular smartphone operating systems may be less vulnerable than PCs, experts say the growing popularity of mobile gadgets means malicious coders will inevitably target them more often in the future.
Studies have revealed that users are, often, unaware of the malware threat on these devices and do not feel the need to protect their phones. A survey commissioned by Slovakia-based security company ESET has found that a high number of smartphone users are at risk of losing data because of a virus attack. The research revealed that 31% of consumers do not even know their smartphone is at risk of viruses, while 14% assume security was built into the phone when they bought it.
It is expected that the number of smartphone users worldwide will exceed the one billion mark by 2013, with growth driven by ongoing competition between top tier OEMS and challengers such as Google, RIM, Apple and Microsoft, all of which are racing to create the best possible user experience at lower pricing points. Although Symbian currently leads the market, Android will become the most popular brand in the mobile OS market and is expected to attract more than half a billion users by 2015, according to the latest forecasts from Informa Telecoms & Media
Meanwhile, the number of Android users is expected to grow very rapidly thanks to the strong support by almost all major players in the mobile industry value chain – with the exception of Nokia. In fact, this platform is currently supported by some 200+ regional mobile operators and 20 top tier vendors. Today, about 100 Android smartphone models and variants have been launched worldwide, targeting different segments of the smartphone market Nine out of ten smartphone owners use the device to browse the Internet, but only 6% have antivirus installed, finds survey
Smartphone virus attacks are very common these days. The number of virus attacks is only going to increase if organizations fail to pay attention on the vulnerabilities of their mobile security. Organizations need to enforce robust information security initiatives, including having a proficiently skilled IT security workforce, in order to prevent cyber attacks and minimize security breaches. Information security professionals can increase their IT security knowledge and skills by embarking on advanced and highly technical training programs. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency of technically proficient information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography, among others. These highly sought after and lab intensive information security training courses will be offered at all EC-Council hosted conferences and events, and through specially selected authorized training centers.
About EC-COUNCIL
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 70 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 38,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.
Add Comment
Computers Articles
1. Rsgoldfast Runescape Gold:fishingAuthor: RuneScape gold
2. Understanding Mobile Intranet Workflow
Author: goodcoders
3. How To Personalize Your Mobile Ux?
Author: goodcoders
4. How To Optimize The Fintech Software Release Management Process
Author: goodcoders
5. Data Recovery Services Near Me: Your Ultimate Guide To Retrieving Lost Data
Author: adeel khan
6. Top 5 Data Cleansing Tools Of 2025
Author: Ben Gross
7. Come Ottenere Una Licenza Windows 11 In Italia: Guida Completa
Author: LicensePlanet
8. How To Build A Strong Brand Identity With Graphic Design
Author: dnd teams
9. Exploring The Generative Ai Market: Trends, Growth Drivers, And Future Outlook
Author: simran
10. Microsoft Dynamics 365 Vs Salesforce – Comparisons (2025)
Author: Maria
11. Top 5 Influencer Marketing Software Of 2025
Author: Ben Gross
12. Augmented Reality And Its Role In Manufacturing
Author: goodcoders
13. Effortless Environment Tracking With Tempgenius: Wifi Humidity Monitoring And Wireless Data Loggers
Author: Chris Miller
14. Sales Technology Trends That Will Impact Your Business In 2025
Author: Ben Gross
15. Infrastructure Management: Ensuring Efficiency And Sustainability
Author: ServerLT