Top threats targeting mobile devices, as identified by Symantec
Cybercrooks are increasingly capitalising on the mass adoption of mobile devices by exploiting smartphone users, at home or at work. Internet security specialist, Norton by Symantec looks to why the operating platforms of these devices expose people - and all their data - to a greater number of cyber attacks.
Top Threats Targeting currently targeting mobile devices
Data Loss – biggest threat to mobile devices - when hackers can extract sensitive info from devices or networks through those mobile devices.
Social Engineering Attacks – tricks users into disclosing personal information or installing malware by replicating everyday ‘social’ applications.
Malware – traditional computer viruses, computer worms and Trojan horse programs, adapted for the mobile device.
Data Integrity Threats – attempts to corrupt or modify data to disrupt operations for financial gain.
Resource Abuse – attempts to misuse network, device or identity resources e.g. sending spam from compromised devices.
Web and Network-based Attacks – launched by malicious websites or compromised legitimate sites and exploits device’s browser.
“Today’s mobile devices connect to an entire ecosystem of supporting services and the typical smartphone synchronizes with at least one service that is outside the user’s control. At the same time, many users also directly synchronize workplace mobile devices with home computers. In both scenarios, key assets may be stored in any number of insecure locations outside the direct view of the user and the business for which they work,” says Tamim Taufiq, Head of Consumer Sales in the MENA region for internet security experts, Symantec.
Analysis from Symantec’s newly released white paper, available here, shows that while the most popular mobile platforms in use today were designed with security in mind, they may still be insufficient to protect the assets that regularly find their way onto these devices.
“Norton by Symantec has already witnessed multiple attacks that exploited weaknesses inherent to the Android platform. We’ve also seen attempts to evade Apple’s strong security with criminals employing socially engineered attacks, such as phishing, to trick people into disclosing sensitive information,” says Taufiq.
This latest data reveals just how effective mobile platforms can be for targeting victims, adds Taufiq: “While sneak attacks through “poisoned” apps and hidden malware may be obvious to the trained eye, new and unfamiliar users in particular are at high risk as cybercriminals find new ways to replicate legtimate applications, leaving the victim’s data wide open for the taking. As incidents become more frequent and more sophisticated, the need for both awareness of the risks and of course the use of comprehensive mobile security is fundamental for the modern mobile device user.”