All the latest UK technology news, reviews and analysis

Symantec Vision day two: mobile malware demos

05 Oct 2011

It was the turn of Symantec's Security Response Team on day two of Vision 2011 in Barcelona, as we were shown a couple of interesting demos illustrating a typical targeted attack and a mobile malware threat.

First up, security operations manager Orla Cox explained the now familiar route for criminals determined to infiltrate organisations undercover, first via malicious email and then with the help of remote access tools.

We then saw in action how a remote access tool like this can enable a hacker to take complete control of an infected machine with the same ease that a user might log-in via Citrix's popular GoToMyPC tool.

More impressive still was a demo of the Geinimi Trojan, which has been discovered doing the rounds on several unofficial Google Android app stores in China.

Although cyber criminals are using a variety of methods to make money out of mobile malware - adware, pay-per-install, pay-per-click, search engine poisoning and premium rate billing - the number of unique malware samples discovered so far is relatively low at 266, according to Symantec global security response director Kevin Hogan.

The most popular delivery vector is still via application stores, he explained.

"They take a clean app, break it apart, copy in malicious code, bundle it together and post it to the app store," said Hogan, adding that Android app stores are more likely to feature such malicious apps than the iOS App Store.

Elsewhere, we heard all about Symantec's plans for the cloud. Rowan Trollope, SMB and president, revealed that the firm will offer all of its security products "that make sense" in the cloud sooner rather than later.

Lots of food for thought at a much more insightful day at the event, as is often the case with the major product announcements safely out of the way.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Phil Muncaster

Phil Muncaster is news editor at, a role he has fulfilled since January 2010. Previously he was chief reporter for IT Week, having also worked as a reporter and senior reporter on the publication from 2005.

Before IT Week, Phil worked as a researcher for the Rough Guide. Prior to his work in journalism, Phil spent three years teaching English in Japan.



More on Security
What do you think?
blog comments powered by Disqus

Work location poll - office, remote or home?

Where do you spend most time working on your primary work device?

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Beacon technology: what are the opportunities and how does the technology work?

This paper seeks to provide education and technical insight to beacons, in addition to providing insight to Apple's iBeacon specification


Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

.Net Developer - ASP.Net / C# / VB.Net / SQL Server / HTML

.Net Developer - ASP.Net / C# / VB.Net / SQL Server...

Junior PHP Developer - PHP / MySQL / HTML / CSS

Junior PHP Developer - PHP / MySQL / HTML / CSS Leading...

Senior .Net Developer - ASP.Net / C# / SQL Server / HTML / CSS

Senior .Net Developer - ASP.Net / C# / SQL Server / HTML...

Junior Software Developer - Web / C# / ASP.Net / HTML / CSS

Junior Software Developer - Web / C# / ASP.Net / HTML...
To send to more than one email address, simply separate each address with a comma.