Threat of the month: Mobile malware

Share this article:
August's threat of the month is mobile malware.
August's threat of the month is mobile malware.

What is it?

Malware is increasingly being created for mobile devices, as growth of these devices explodes. 

How does It work?

Two main types of mobile malware are “trojans” and “rootkits.” Trojans are programs that can provide the attacker unauthorized access to the device. These usually appear in apps downloaded on the device. Rootkits are malware that typically activate when the device system boots up. A rootkit allows the installation of hidden files, hidden user accounts, etc., to gain root (administrator) access over the device.

How can I prevent it?

Have your employees only download apps from trusted stores, since apps from third-party stores are more likely to be infected with malware. Have employees keep their devices updated to the latest available firmware, as this is the best way to patch device vulnerabilities. Also, ask employees not to click unfamiliar links sent by SMS or email, and instead notify the security department.

Share this article:
close

Next Article in Threat of the Month

Sign up to our newsletters

More in Threat of the Month

Threat of the month: Linksys router zero-day

Threat of the month: Linksys router zero-day

This month's vulnerability is currently being exploited by a worm known as "TheMoon."

Threat of the month: Java vulnerabilities

Threat of the month: Java vulnerabilities

For March's threat of the month, Secunia's Kasper Lindgaard believes Java vulnerabilities should be at the top of everyone's radar.

Threat of the month: Government agencies

Threat of the month: Government agencies

The continued leak of classified government intelligence documents by Edward Snowden draws into question the balance of offensive and defensive capabilities of governments.