• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Mobile Malware Set to Explode, Security Pros Say

    October 4, 2011 Alex Woodie

    You knew it was just a matter of time before cyber criminals began targeting smart phones–not just writing the occasional bit of malware, but really targeting mobile platforms with purpose. That time has now arrived, according to IBM‘s X-Force security organization, which issued a new report last week that warned of the coming explosion of security problems in mobile devices.

    The number of mobile exploits observed in the wild is on pace to double this year compared to 2010 numbers, X-Force says in its 2011 Mid-Year Trend and Risk Report released last week. At the beginning of 2010, malware writers had crafted about 15 exploits to take advantage of vulnerabilities in mobile operating systems, according to the X-Force report. By the beginning of 2011, there were nearly 35 documented exploits.

    The creation of mobile exploits is expanding at a rate greater than 2x, despite the fact that the growth rate of underlying vulnerabilities is declining. According to the X-Force report, there were about 60 total mobile OS vulnerabilities at the start of 2009, and more than 160 at the start of 2010. At the start of 2011, there were about 185.

    “For years, observers have been wondering when malware would become a real problem for the latest generation of mobile devices,” Tom Cross, manager of Threat Intelligence and Strategy for IBM X-Force, says in a press release. “It appears that the wait is over.”

    IBM X-Force says some developers of mobile phone operating systems are not issuing updates as fast as they should, although it did not name vendors. Google‘s Android and Apple‘s iOS are by far the most popular mobile device platforms, accounting for the bulk in the estimated 270 million smartphones to be sold this year.

    Android is widely regarded as a rich target for cyber criminals. This is due to Android’s openness and Google’s reliance on users to ferret bad apps out of the Android marketplace. For example, a criminal can post a piece of malware in the “banking apps” section, and potentially steal the users’ authentication information for accessing accounts. Apple, on the other hand, runs a much more closed shop with iOS, and maintains strict controls over iOS apps made available for downloads through its store.

    Juniper Networks‘ Global Threat Center said in May that it had detected a 400 percent increase in Android malware. Despite the large increase in malware, the vast majority of mobile users don’t have any kind of antivirus or security software installed on their devices.

    The problem is compounded by the fact that some pieces of malware masquerade as anti-malware. There is also confusion over whether some legitimate anti-malware software can do bad things to a user’s device. Those Quick Response (QR) codes that are popping up everywhere are also being used by hackers to load malware on user’s mobile phones.

    It can be quite easy and straightforward for cyber criminals to monetize their nefarious mobile activities. Once a malicious app or Trojan is downloaded and installed, the malware simply sends SMS messages to premium-rate phone numbers. This results in a charge to the victim’s mobile phone account and income for the criminal. IBM also warned about the potential for mobile malware to steal the victim’s personal data, which can be used for identity theft or targeted phishing attacks.

    IBM i shops, which are moving toward mobile- and tablet-based client interfaces as quickly as they are developing Web-based front-ends to their apps, should heed the warning and equip their employees’ mobile devices with the anti-malware and patch management software necessary to keep the devices and their employees secure.

    RELATED STORIES

    Hackers Escalate Web Site Attacks, Despite Decline in Security Vulnerabilities

    Web Site Vulnerabilities Continue Unabated, IBM X-Force Says

    Decline In Vulnerabilities Belies Threat Increase, Microsoft Says in New Security Report

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    System i Developer:  Join the Gurus at the RPG & DB2 Summit in St. Louis, October 17-19
    The 400 School:  LIVE Online Training RPG IV & COBOL Boot Camps
    Shield Advanced Solutions:  Access IBM i data & objects from Linux & Windows Servers using PHP

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Continued U.S. Investments In IT Pay Off Call Again and Again and Again…

    Leave a Reply Cancel reply

Volume 11, Number 32 -- October 4, 2011
THIS ISSUE SPONSORED BY:

Vision Solutions
Infor
The 400 School
Connectria Hosting
Shield Advanced Solutions

Table of Contents

  • Seagull Delivers Major New Release of LegaSuite
  • Crossroads Shrinks its SPHiNX VTL, Adds SAS Support
  • Mobile Malware Set to Explode, Security Pros Say
  • Vision Updates Database Replication Solution
  • Attunity Unveils New Data Replication Suite
  • IBM Adds JEE 6 Support to WebSphere Community Edition
  • AquaFold Updates Database Editor
  • Liaison Goes Multi Platform with B2B Tool
  • Canam Goes JSON with COBOL Integration Tool
  • CYBRA Signs European Distributor for RFID and Barcode Products

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle