Threat of the month: Mobile malware

Share this article:
August's threat of the month is mobile malware.
August's threat of the month is mobile malware.

What is it?

Malware is increasingly being created for mobile devices, as growth of these devices explodes. 

How does It work?

Two main types of mobile malware are “trojans” and “rootkits.” Trojans are programs that can provide the attacker unauthorized access to the device. These usually appear in apps downloaded on the device. Rootkits are malware that typically activate when the device system boots up. A rootkit allows the installation of hidden files, hidden user accounts, etc., to gain root (administrator) access over the device.

How can I prevent it?

Have your employees only download apps from trusted stores, since apps from third-party stores are more likely to be infected with malware. Have employees keep their devices updated to the latest available firmware, as this is the best way to patch device vulnerabilities. Also, ask employees not to click unfamiliar links sent by SMS or email, and instead notify the security department.

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Threat of the Month

Sign up to our newsletters

TOP COMMENTS

More in Threat of the Month

Threat of the month: Passwords

Threat of the month: Passwords

The argument around the use of passwords and their relevancy today continues to increase.

Threat of the month: Network deperimeterization

Threat of the month: Network deperimeterization

Security professionals should be aware of network deperimeterization, which decreases the usefulness of network edge security devices and increases the potential for device infection and data loss.

Threat of the month: Drive-by download

Threat of the month: Drive-by download

The pervasiveness of drive-by downloads has made it our threat of the month for May.