Preview

Mobile Malware

Better Essays
Open Document
Open Document
1047 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Malware
Mobile devices have changed the way we live, work and play yet the tricks that have been used by cyber criminals to install malware on our computers are now beginning to threaten our smart phones and other mobile devices. Malware is any type of hostile, intrusive, annoying software or program code that is designed to use a device without the owner’s consent. They can be grouped into several categories ranging from viruses, worms, Trojans, rootkits and botnets. Throughout this paper I will discuss the different types of malware more in detail, divulge the operating system that may be more vulnerable to malware, describe the stages of malware attacks and explain the practices to avoid malware on your mobile device.
Due to a significant increase in the number of mobile devices in use, malware threats on mobile devices are becoming a serious issue. These are various types of socially engineered attacks that simply trick the consumer into accepting what the cybercriminal is selling. As mentioned earlier, there are several forms of mobile malware that can be delivered to mobile device. The most common mobile threat is spam. Spam are poisoned links on the social networking sites and rogue applications usually delivered through unsolicited emails. A virus is a piece of code that has replicated itself and therefore, infect other programs. Whereas a worm is a program that makes copies of itself, typically from one device to another using different transport mechanisms without any user intervention. This attachment can damage and compromise the security of the device or consume the network bandwidth. Rootkits achieve their malicious goals by infecting the operating system. They usually hide nasty process files or install Trojans to disable firewalls and antivirus. Hence, rootkits have the ability of staying longer on the device since they have control of the operating system. Lastly, the botnet provide hackers with permission over the compromised mobile



References: La Polla, M., Martinelli, F., & Sgandurra, D. (2013a). A Survey on Security for Mobile Devices. IEEE Communications Surveys Tutorials, 15(1), 446–471. doi:10.1109/SURV.2012.013012.00028 La Polla, M., Martinelli, F., & Sgandurra, D. (2013b). A Survey on Security for Mobile Devices. IEEE Communications Surveys Tutorials, 15(1), 446–471. doi:10.1109/SURV.2012.013012.00028 Protect your Android device from malware. (n.d.). Retrieved September 21, 2014, from http://www.cnet.com/how-to/protect-your-android-device-from-malware/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Mobile use has become increasingly popular because of the advances in phone, tablet and laptop technology. Kudler Fine Foods must embrace this new technology not only to use it to further their business goals but to also address the security concerns that it poses. Allowing mobile use on the organizational network would mean using wireless connectivity, this opens up the network to a number of threats such as:…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD).…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Students, especially college students, are consistently on some type of social media site or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartphones, laptops, and now even smartwatches. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access.…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Malware, Spyware & Adware

    • 2084 Words
    • 9 Pages

    Malware is new genre of hostile software, written in a high level language. Normally they target technical vulnerabilities in the system. Spyware, adware, Trojans, virus, worms are very common form of Malware prevalent on the Internet. It propagates through emails, IM and other web services. It can be categorized into criminal and business malware. Criminal malware is used in cyber terrorism and vandalism; while business malware is used for business/monetary benefits.…

    • 2084 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Syrian Genocide

    • 473 Words
    • 2 Pages

    The Syrian breakdown began in 2011 when Syrian President Bashar el-Assad began a brutal crackdown because of the peaceful protestors of the country. The attacks escalated when a civil war broke out between the Assad Regime with allied militias and opposition groups against the protesters because a group of kids under the age of 15 sprayed a wall with graffiti, demeaning the Assad Regime, which was considered a crime against the government.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    2. Explain carefully the differences between Phishing and Pharming as types of mobile malware innovations.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Best Essays

    6. W. David Gardner, “Wireless Survey: Many Nets Open To Security Breaches”, Information Week, Mar 10, 2005…

    • 3916 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    Mobile Computing

    • 1913 Words
    • 8 Pages

    Brady, James., Sadler, Connie J., Finney, Shannon., Oakes, Reid., Seymour, Dennis M., & Woods, Beau (November 11, 2011). Security of Mobile Computing Devices in the Healthcare Environment. Retrieved from http://www.himss.org/content/files/PrivacySecurity/HIMSS_Mobility_Security_in_Healthcare_Final.pdf…

    • 1913 Words
    • 8 Pages
    Powerful Essays

Related Topics