• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • Data Strategy Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Firms and governments face mobile security nightmare as 23,000 new threats emerge

Kaspersky Lab calls for governments to team up in anti-hacker fight

Google Android Malware
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 22 May 2013
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

Businesses and governments need to update their security strategies if they hope to protect themselves from rising tide of mobile threats, pegged at 23,000 for the year so far, according to Kaspersky Lab.

The Russian security firm released its Q1 2013 threat report on Tuesday, confirming it detected 22,750 versions of evolved mobile malware during the period. The figure means hackers have already created more than half the number of mobile malware that they did in the whole of 2012. Kaspersky said the number could continue to increase as virus writers keep taking advantage of security flaws in Android.

Kaspersky researcher David Emm told V3 the influx of new malwares proves governments and businesses current defence strategies are not adequate, on Wednesday.

"At a societal level, there are a number of factors that can help combat the increase in mobile malware. This includes the development of a legislative framework to deal with cyber criminals (in the UK we have well-developed legislation, but that's not true of all regions of the world), cross-border co-operation of law enforcement agencies, and market regulation (e.g. it's harder to set up an affiliate network that will allow successful monetisation of SMS-Trojans in the UK compared to Russia, China and other areas)," he said.

"In regards to businesses, organisations need to ensure they include mobile devices in their security strategy and deploy appropriate technology. This includes anti-malware, whitelisting, encryption, centralised policy management and containerisation of personal and business data (a result of the BYOD trend). It's also not just the threat of malware on the device, but the network itself, as shown by the discovery of 'Red October' - a targeted attack that specifically harvested data from devices connected to the network of victim organisations."

The report said: "Our data shows that in 2012 Android became the number-one target among virus writers, and that the number of threats over the course of the year grew steadily. Has this upswing in the number of mobile threats continued in 2013 so far? Indeed it has [...] A total of 99.9 percent of new mobile threat detections target the Android platform.

"January is traditionally a quiet month for mobile virus writers - ‘only' 1,262 new modifications appeared in the first month of the year. But over the past few months, Kaspersky Lab has detected over 20,000 new mobile malware modifications. In February, we detected 12,044 mobile malware modifications, and another 9,443 in March. To compare - a total of 40,059 modifications of malicious programs targeting mobile devices were detected over the whole of 2012."

Kaspersky said SMS Trojans that steal money from victims by forcing infected devices to text premium-rate numbers owned by the hackers remain the most used attack tool, accounting for 63.6 percent of all detected mobile threats.

Looking to the future Emm predicted the number will continue to increase as businesses reliance on mobile devices grows.

"The huge growth in mobile malware is a result of a number of different factors. Firstly, the huge numbers of smartphones being used. Secondly, the variety of ‘interesting' data now stored on these devices, such as: contacts, photographs, SMS messages, banking credentials and social networking logins," he said.

"Finally, the growing use of mobile devices in business and the lack of awareness from organisations around mobile threats. In a survey we commissioned last year, only 55 per cent of businesses considered mobile devices in the workplace a serious threat. The growth of mobile malware is only going to continue as people increasingly conduct business and sensitive transactions via mobile devices.

"Cybercriminals follow the money and as mobile banking and shopping continue to increase in popularity, so will the threats targeting these devices. However, it's not just financial data that's a key target, but also lots of personal data that can be harvested and used to frame targeted attacks."

Kaspersky is one of many firms to detect a marked increase in mobile malware targeting smartphone owners. Finnish security firm F-Secure said the number of mobile malware variants targeting smartphone and tablet users has risen by 49 percent since 2012 in its Q1 2013 Threat Report.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • malware
  • Smartphones
  • Hacking
  • cyber-crime
  • Android
  • Kaspersky

V3 Latest

TSMC starts high volume production of 7nm chips
TSMC starts high volume production of 7nm chips

Claims to have "the most competitive logic density" in the industry

  • Components
  • 25 April 2018
Dell unveils Precision 5530 2-in-1 mobile workstation with Radeon Pro WX Vega M GL graphics
Dell unveils Precision 5530 2-in-1 mobile workstation with Radeon Pro WX Vega M GL graphics

Dell's high-end mobile workstations upgraded with Intel Coffee Lake CPUs

  • Hardware
  • 25 April 2018
Europol coordinates close down of 'world's biggest' DDoS-for-hire service
Europol coordinates close down of 'world's biggest' DDoS-for-hire service

Webstresser admins were also arrested in the UK, Croatia, Canada and Serbia

  • Security
  • 25 April 2018
Almost 90 per cent of UK websites suffer from 'serious' security flaws
Almost 90 per cent of UK websites suffer from 'serious' security flaws

Security firm claims that 117,638 sites out of 135,035 analysed contain serious security flaws

  • Security
  • 25 April 2018
Back to Top

Most read

Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year
AI could improve global stability from around 2040, claims US thinktank RAND Corporation
AI could improve global stability from around 2040, claims US thinktank RAND Corporation
How NoSQL database technology and IoT sensors are being put to work saving endangered elephants and tigers
How NoSQL database technology and IoT sensors are being put to work saving endangered elephants and tigers
MPs demand answers from TSB over online banking 'meltdown' following platform migration
MPs demand answers from TSB over online banking 'meltdown' following platform migration
British security start-up launches lip-sync authentication technology
British security start-up launches lip-sync authentication technology
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017