"With users in the Middle East using smartphone and Android to access the Internet more frequently for online shopping, social networking and downloading applications from sites which are a perfect environment for malware plantation, the increased risk of losing personal information is something not to be joked about," Bulent Teksoz, Chief Security Strategist, Emerging Markets, Symantec tells AMEinfo.com.
"Attackers honing in further on mobile devices in 2012 will mean that confidential data loss through these devices will be a growing issue for consumers," he adds.
In some part Android is a victim of its own success because with more people using mobile devices running on Android operating systems the more likely it is that cybercriminals will target these devices in particular.
Google Bouncer now introduced to curb threat
Google has acknowledged the threat to its users and acted upon it, recently introducing Google Bouncer, a security service for the Android platform which monitors the Android Market and picks out those thought to be malware.
"Today we're revealing a service we've developed, codenamed Bouncer, which provides automated scanning of the Android Market for potentially malicious software without disrupting the user experience of the Android Market or requiring developers to go through an application approval process," Android VP of engineering Hiroshi Lockheimer explained in a blog post.
Lockheimer added that the Bouncer service runs every new application on the Google cloud infrastructure in order to simulate how it will run on an Android device. This enables Google to look for hidden and malicious behaviour. "We also analyse new developer accounts to help prevent malicious and repeat-offending developers from coming back," Lockheimer said in his blog.
Individuals need to be aware of malicious software threat
However, Teksoz is keen to point to the responsibility of the individual to make sure they are not downloading malicious software.
"Screening processes and certification measures can definitely help in securing the Android market, however as we are seeing this threat evolving consistently and rapidly there is no substitute for users taking security into their own hands and adopting an easy-to-follow defensive strategy. A great deal of your personal information, including calendars, email, usernames, passwords, and texts are all stored on your mobile phone," he states.
"As these devices increasingly start to operate with all the functionality of a desktop or laptop, this enhances the need for organisations and consumers to adopt a consistent approach to protecting themselves across all devices from which they are accessing the Internet," adds Teksoz.
Damage of infected app can vary
The amount of damage which can be caused by downloading an infected app can vary. Some may just restart the phone or wipe its memory, others are much more dangerous and costly.
"The main problem, specifically in the Middle East is infiltrating these devices to spread infection through text messages and calls to premium numbers. For example, we are seeing users downloading what appears to be a legitimate application which will then automatically download a malicious code that proceeds to send text messages to 'premium' numbers that are being rented out by cybercriminals leaving the user with a nasty surprise when they receive their phone bill at the end of the month," reveals Teksoz.



Peter Ward, Reporter



