Credit card fraud, identity theft, stalking – these are only a few of the many reasons why you should be thinking about how to protect yourself from mobile malware. When they hear terms like keylogging, worms, and spyware, most people think of their home computers and laptops, not their mobile devices. In 2013, researchers at Pew Research Center released the results of their latest study confirming that 97% of 18-34 year-olds own mobile devices, followed by 91% of people aged 35-64.

Mobile Phone Ownership

The most substantial increase in mobile phone ownership over the last ten years. However, as senior citizens, of whom 76% personally own a cell phone or mobile device of some sort. Mobile phones have been by far the fastest growing technological commodity in history. And with the advent of e-readers and tablets opening doors for previously under-marketed groups, mobile device usage will continue to grow. The most shocking statistic is that only 20% of mobile device owners have the barest security installed on their devices.

This threat becomes even more important when we consider how corporations allow their employees to access important information on these devices.

Susceptible to Malware

Mobile devices are more vulnerable to malware than personal PCs and laptops, for a few reasons. Online account access has made our lives easier; we can now pay our utility bills, check our bank account balance, transfer money from our checking account to our savings, and pay off our credit card bill all with the touch of a button from a single device. The same device we use to handle such highly sensitive personal information is also what we use to navigate the day-to-day aspects of our lives: we connect to social networking sites like Facebook, Foursquare, and Twitter, then we upload photographs of critical moments and occasions to Instagram and share them by email. We send out e-invites and RSVP’s for events, keep track of our diets with apps, listen to new music from iTunes, and mark significant events in our PDAs. We access sensitive corporate data.

Unlike our home computer and laptops, tablets, cell phones, and e-readers are specifically designed to be lightweight, easy to transport, and convenient to use wherever we go.  When you consider the implications of the two, you have the perfect storm for disaster.

Malware in Different Forms

Mobile malware comes in different forms, but some of the major types are trojans, Javamites, spyware, and worms. Each one works differently.

Trojans are just what they sound like, a virus that hiding in some seemingly innocuous package, like an email attachment or a download disguised as an app. They require the user to let them in, which we do by opening them or downloading them. Once they’re in, they wreak havoc by breaking down operating systems, locking you out of your device, and allowing the sender to upload your files and passwords to another device. You can be proactive by never opening email from unknown users or using public Wi-Fi spots to log into sensitive account information.

Spyware

Spyware precisely does  what it says, by inserting itself into your system and then leeching information about what sites you go to, what software you use and other activity, which it then uses to manipulate your system into redirecting viruses and hijacking. A Spyware is often disguised to resemble well-known websites.  So, that the user thinks they’re downloading a well-known and trusted app or program. If you are trying to download a new app or get a pop-up box telling you that you need to update an existing program, always be sure to look at the URL at the top of the page.

Most legitimate websites are followed by “.com” or “.org.” For example, your bank’s website was http:///www.FamilyBank.com, Spyware designers might try to con you into “updating” your information. By using a well-made copy of your bank’s normal logo and template. Sometimes they’re very close in name, so if you don’t know the actual URL, it’s always safer to close the pop-up window, and then manually go to your bank’s website. Any updates or notifications they have or you will be accessible there as well.

Worm

Worms don’t change or damage your device’s software the way Trojans do. But instead, steal your information by first replicating it. And then using similar systems to move the replicated information out into as many other devices as possible. Cabir was designed to work on Bluetooth devices. Served as a model for many later worms that were used to steal personal information. That could then be used for identity theft, credit card theft, and for obtaining other sensitive information.

Worms can also be utilized to protect the creators of the infection further. Adding what’s called a backdoor to your device that allows them to use your device as a proxy. The backdoor will enable them to use your device to hide their own.  And more importantly, by installing good security software for protection.

Javamites

Javamites are one of the most dangerous trends in mobile malware. And not as well understood as other types of malware that made the jump from personal computers to mobile devices. Javamites manipulate Java software and is used heavily with mobile devices. It allows the devices to access content on the internet.  Not formatted for mobile device capabilities. Over 85% of mobile devices are running Java.

As we continue to progress technologically, we become more and more dependent on our mobile devices for convenience. The mobile device has made leaps and bounds. Concerning bringing accessibility to a much broader range of users and uses. We jump to learn about the latest update to our tablets. Or to find out the hottest new trend in social networking. So, we must open our eyes to the increasing danger of mobile malware. Awareness is our best defense, along with mobile device protection. We will be better able to safely and securely take advantage of the latest technological ones. Without having to worry about who else might be trying to take advantage of us.

ServerPronto offers the best affordable and secure hosting service in all dedicated server packages.

Photo credit Flickr / okalkavan

Comments are closed.