Tag: tablet security

Mobile security concerns stem primarily from apps

Businesses that have bring your own device (BYOD) programs must protect themselves against this risk.

The mobile security risk that is created by the use of tablets and smartphones in businesses as a result of the use of third party apps has experienced a “monumental increase” according to the results of a recently published report.

What it showed as that these concerns have been steadily and considerably growing.

This is the case, said the report, even in the activation of enterprise apps that have greater mobile security complexity, particularly in terms of secure browsing. This information was published within the Q1 2014 Mobile Index Report that was issued by Good Technology. It also revealed that organizations are actually trying to take back control over their risks by leveraging enterprise apps that do provide greater protection.

The data for this mobile security report is gleaned from the activation tracking done by Good Technology.

That company has tracked activations over mobile devices and platforms and then leveraged its findings from over 5000 of its customers around the world. Within the report, it was explained that companies have called IT their leading concern for this year. Moreover, there has been a considerable 57 percent growth rate (quarter over quarter) in the activations of secure enterprise apps. This is an increase over 54 percent in the previous quarter and 43 percent in the one before that.Mobile Security and Apps

It was also underscored by Good Technology that these are “not surprising” results. The Ponemon Institute published the 2014 State of Endpoint Risk report which also placed the spotlight on risks connected with the use of mobile devices such as tablets and smartphones. It identified third party apps as the leading risk faced by business IT departments.

The Good Mobility Index Report indicated that the total number of activations of browsing apps with heightened mobile security throughout the customer base of Good Technology saw an unbelievable 2900 percent increase during this quarter. This brought it to the app category that is fifth most activated. In previous quarters, it hadn’t even made it into the top ten most activated lists.

Mobile security threat takes aim at text messages

New malware is now causing problems, particularly with Android users who speak Russian.

Just as smartphone users are beginning to realize that their small screen devices could suffer just as big a malware threat as their laptops and desktop computers, a new mobile security announcement has been made which has revealed that Android users who speak Russian are being targeted by a new type of text based attack.

This specific form of mobile malware moves right in to the device contact list to spread and infect others.

According to Eset, a security vendor, the malware is a worm-like virus called “Android/Samsapo.A”. Once it has made its way into a device, it can download other malicious files into that device, as well, making it a mobile security problem that only gets worse. It can also steal an individual’s personal information from his or her smartphone or tablet, including from text messages, and it can block phone calls from being made or received.

This mobile security threat is a very new one and it is important for device users to be aware of it.

According to a malware researcher from Eset, Robert Lipovsky, this virus uploads the data that it obtains from a device into a domain that is less than a month old. The spread of the Samsapo virus occurs by automatically sending out text messages from the infected mobile device so that they will be received by other people whose contact data is saved within the address list.mobile security - texting

The virus has a rather worm-like characteristic in that has been used in other forms of malware that have been infecting smartphones and even tablets. In this specific case, the text message that spreads the virus currently says, in Russian, “Is this your photo?”. It provides a link that directs the device user to an Android app package file (.APK), which contains a copy of the virus, which will then be downloaded into the new device, starting the process over again.

Lipovsky stated that “This technique wouldn’t raise an eyebrow on Windows, but is rather novel on Android.”

The best way to avoid this type of mobile security breach is to avoid the download of third party platform apps, and to keep away from websites that provide sketchy, illegal, threatening, or dangerous content.