123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cybercriminals Are Attacking Smartphones With New Variants Of Trojans And Spyware

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Smartphone virus attack soars as malicious programmers are always looking for new targets. Hackers are following prey onto smartphones and social networking hotspots, according to reports released Tuesday by Symantec, stated in the latest volume of its Internet Security Threat Report.
While smartphones and tablets replace PCs as the gadgets we use for messaging, Web surfing and even doing business, cybercriminals are starting to target these devices with new forms of Trojans and spyware. Cyber criminals are also ramping up the sophistication and frequency of attacks on business and government networks. Symantec also depicted a "massive" volume of more than 286 new computer threats on the Internet last year, a continued growth in attacks at online social networks and "a notable shift in focus" by hackers to mobile devices.
In recent months, smartphones running on Google-backed Android software were the target of the largest attack ever on the devices, noted a PandaLabs report. PandaLabs said "This assault was launched from malicious applications on Android Market, the official app store for the operating system,"
...
... The purpose of attacks was mostly unclear. But one app used a phone's locating software to transmit the owners' whereabouts without permission. Another was designed to quietly send repeated text messages, while charging hefty fees to the owner's wireless account. The number of threats is very small compared with the vast array of malware targeting PCs. At this moment, some experts believe it's more important for smartphone users to follow common-sense precautions than to purchase one of the commercial antivirus products now offered for mobile devices. But even though the most popular smartphone operating systems may be less vulnerable than PCs, experts say the growing popularity of mobile gadgets means malicious coders will inevitably target them more often in the future.
Studies have revealed that users are, often, unaware of the malware threat on these devices and do not feel the need to protect their phones. A survey commissioned by Slovakia-based security company ESET has found that a high number of smartphone users are at risk of losing data because of a virus attack. The research revealed that 31% of consumers do not even know their smartphone is at risk of viruses, while 14% assume security was built into the phone when they bought it.
It is expected that the number of smartphone users worldwide will exceed the one billion mark by 2013, with growth driven by ongoing competition between top tier OEMS and challengers such as Google, RIM, Apple and Microsoft, all of which are racing to create the best possible user experience at lower pricing points. Although Symbian currently leads the market, Android will become the most popular brand in the mobile OS market and is expected to attract more than half a billion users by 2015, according to the latest forecasts from Informa Telecoms & Media
Meanwhile, the number of Android users is expected to grow very rapidly thanks to the strong support by almost all major players in the mobile industry value chain – with the exception of Nokia. In fact, this platform is currently supported by some 200+ regional mobile operators and 20 top tier vendors. Today, about 100 Android smartphone models and variants have been launched worldwide, targeting different segments of the smartphone market Nine out of ten smartphone owners use the device to browse the Internet, but only 6% have antivirus installed, finds survey
Smartphone virus attacks are very common these days. The number of virus attacks is only going to increase if organizations fail to pay attention on the vulnerabilities of their mobile security. Organizations need to enforce robust information security initiatives, including having a proficiently skilled IT security workforce, in order to prevent cyber attacks and minimize security breaches. Information security professionals can increase their IT security knowledge and skills by embarking on advanced and highly technical training programs. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency of technically proficient information security professionals.
CAST will provide advanced technical security training covering topics such as Advanced Penetration Testing, Digital Mobile Forensics, Advanced Application Security, Advanced Network Defense, and Cryptography, among others. These highly sought after and lab intensive information security training courses will be offered at all EC-Council hosted conferences and events, and through specially selected authorized training centers.
About EC-COUNCIL
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other information security training programs offered in over 70 countries around the globe. EC-Council has trained over 80,000 individuals in technical security training and certified more than 38,000 security professionals. EC-Council has launched the Center of Advanced Security Training (CAST), to address the deficiency in the lack of highly technically skilled information security professionals.

Total Views: 346Word Count: 812See All articles From Author

Add Comment

Computers Articles

1. Contract Hiring Mobile App Developers In 2024-25
Author: SpryBit Agency

2. Hiring Developers On Contract : Freelance Platforms Vs It Agencies
Author: SpryBit Agency

3. Lexicon Systems: Best Partner For Hardware And Computer Rentals Across Tamil Nadu
Author: HubraSEO

4. Student Engagement – What Universities Must Know And Do
Author: Engage2serve

5. Understanding The Importance Of Software Testing In Development
Author: Xsosys Technology(S) Pte. Ltd.

6. The Importance Of Iso 27001 Consultancy For Secure Business Operations
Author: Qadit

7. Transforming Industries: The Power Of Automation And Robotics Services
Author: andrew smith

8. Businesses Should Work With Hipaa-compliant It Services
Author: Daniel Jones

9. 5 Sketch Plugins You Need To Succeed
Author: goodcoders

10. Best Practices For Building A Successful Enterprise Software
Author: goodcoders

11. 10 Best Open-source Test Automation Frameworks
Author: goodcoders

12. Whatsapp Api | Understanding Messaging Types In Whatsapp Api Services A Comprehensive Guide For Businesses | Whatsapp Chatbot For Insurance
Author: AskEva

13. Benefits Of Upgrading To Ethernet Cable
Author: Jennifer Truong

14. Best Software Company In Lucknow
Author: SigmaIT Software Designers Pvt. Ltd.

15. What To Expect From The App Store And Google Play Store When You Launch Your First App? Previous Next View Larger Image
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: