Site icon

Android comes under attack from cyber criminals

<!–
–>

Email this

Facebook
Twitter

Print this

‘ +
google_ads[0].line1 + ‘
: ‘ +
google_ads[0].line2 + ‘ ’ +
google_ads[0].line3 + ‘

‘ +
google_ads[0].visible_url + ‘
‘;

} else if (google_ads.length 1) {

s += ‘Ads by Google

/*
* For text ads, append each ad to the string.
*/

for(i = 0; i ‘ +
google_ads[i].line1 + ‘
:’ +
google_ads[i].line2 + ” +
google_ads[i].line3 + ‘
‘ +
google_ads[i].visible_url + ‘

‘;
}
}
}

if (google_ads[0].bidtype == “CPC”) { /* insert this snippet for each ad call */
google_adnum = google_adnum + google_ads.length;
}

document.write(s);
return;
}

/* custom_468x60_storypage, created 11/23/10 */
google_ad_client = ‘pub-1723933259695999′; /* substitute your client_id (pub-#) */
google_ad_slot = ’0944360174′;
google_ad_output = ‘js’;
google_max_num_ads = ’1′;
google_ad_type = ‘text_html’;
google_image_size = ’600×15′;
google_feedback = ‘on’;
google_skip = google_adnum; /* to skip for multiple units, insert this snippet for each ad call */
// –

<!–
/*
* The JavaScript returned from the following page uses
* the parameter values assigned above to populate an array
* of ad objects. Once that array has been populated,
* the JavaScript will call the google_ad_request_done
* function to display the ads.
*/
–>

Malware targeting devices running on this OS jumped 37 per cent since last quarter.

Mobile security threats have become a reality. Malware growth for 2011 is set to exceed last year’s, with the Android operating system emerging as the main target.

 Click here to visit SME Buzz

  

Also Read

 

Related Stories

News Now

 

Also Read

 

Related Stories

News Now


Wall Street edges higher after GDP, jobless data

FII-TO-FII TRADES: Nirlon traded at 14% premium

Parliamentary panel for options trading in commodity mkt

New telcos join hands, seek spectrum up to 6.2 MHz

Banks increase interest rate on NRE deposits
More
Malware targeted at Android-based devices jumped 37 per cent since last quarter. This puts 2011 on track to become the busiest year in mobile and general malware history, according to a McAfee report. All new mobile malware in Q3 was targeted at Android. Experts feel 2012 will be no different.


For instance, downloading AndroidOS.Tapsnake, an Android version of the popular ‘snake’ game may appear to be harmless. However, once downloaded, it switches on the phone GPS and relays information about the user’s coordinates to a cyber criminal. This is also with Android.Pjapps, a Trojan with back-door entry capabilities that targets Android-based devices. As with the previous threats, it spreads through compromised versions of legitimate applications.

“Cyber criminals are still exploring the smartphone market. We have received a lot of reports of malicious software being circulated in Android marketplaces, and since most Indians do not have updated security software, they run a tremendous risk,” said David Hall, regional consumer product marketing manager, Symantec, Asia Pacific.

According to Hall, the Android application ecosystem has inherent vulnerabilities that allows it to be compromised by hackers and security threats. For instance, in Android.Pjapps, it is difficult to differentiate the legitimate version from the malicious one. However, during installation, it is possible to identify the malicious version by the excessive permission requests it gives. When run, both the legitimate and malicious versions mimic a steam effect on the Android-based device’s screen. The aim of Android.Pjapps is to build a botnet controlled by a number of different command and control (CC) servers.

More, Android application packages (.apk) include the file “rageagainstthecage”, which is a tool commonly used to root the phone. In legitimate circumstances, this file can be used by the owner of the phone to acquire administrative rights on his or her phone. In this case, rooting can allow the malware, Android.Rootcager, to perform more than the usual activities (eg. taking screenshots) not commonly allowed.

In 2011, India witnessed a proliferation of smartphones, paired with an increase in demand for real-time access to enterprise information and applications via these. Coupled with this were the incidents of malware attacks. A Cisco study says the mobile device is expected to become one of the biggest playing grounds of cyber crime in 2012. India, it says, is particularly vulnerable and the number one source for spam in the world.

The Norton Cybercrime Report 2011 said 10 per cent of adults online globally and 17 per cent in India have experienced cyber crime on mobile phones. Also, the Symantec Internet Security Threat Report said there were 42 per cent more mobile vulnerabilities in 2010, compared to 2009. The number of reported new mobile operating system vulnerabilities increased from 115 in 2009 to 163 in 2011.

“For both enterprises and consumers, we expect cyber crime to increasingly migrate to devices, as more users are doing more on devices, and as more vulnerable devices take off. This is true of Zeus, which uses SMS for phishing, downloading a Trojan and stealing credentials and financial information,” said Vinoo Thomas, product manager, McAfee Labs.

Thomas also points out that Android malware has begun a new method of stealing information. “One is Geinimi that poses as a legitimate application and is the first malware that displays botnet-like capabilities. Once it is installed, it has the potential to receive commands from a remote server, allowing the owner of that server to control the phone,” he added. Mobspy.A is another malware that steals and records both incoming and outgoing phone numbers and messages and also GPS location. The information is sent to a central server for later retrieval.

Ajay Data, founder of Bharatberry, which provides email and internet services to customers, says, “One should have a password-protected handset, especially those with application-based passwords. I believe paid apps would be safer than the free ones.”

E-commerce opens a window of opportunities for cyber fraudsters, as many still see their phone as a communication device, rather than something to be kept secure. Industry experts like Thomas and Data believe unless anti-theft and anti-virus software are installed, with features like remote locking and remote data removal, mobile phones will be havens for criminal activities in 2012.

<!–

–>

Other Stories     

Wall Street edges higher after GDP, jobless data

FII-TO-FII TRADES: Nirlon traded at 14% premium

Parliamentary panel for options trading in commodity mkt

New telcos join hands, seek spectrum up to 6.2 MHz

Banks increase interest rate on NRE deposits
<!–

More

rr –>

  Read Business news in 

Advertisements  
Fast Track Your Way To A Global Career. Click here
  
Health is Wealth….. Insurance + Savings… Know More…
  
Your chance to learn and earn: Take the challenge NOW
  
Making lives better through Social Innovation Business..
  
We do not inherit the earth from our ancestors, we borrow it from our children.
  
When we heal the earth, we heal ourselves.

Article source: http://www.business-standard.com/india/news/android-comes-under-attackcyber-criminals/459208/

View full post on National Cyber Security » Virus/Malware/Worms

Exit mobile version