dcsimg

Middle East mobile users warned of Android security threats (page 1 of 2)

  • Middle East: Thursday, February 16 - 2012 at 15:02

Android phones have been found to be the least resistant to most key security threats, including malicious software attacks, unintentional data loss and service attacks due to their open operating platform.

Research from Symantec has revealed a significant rise in malicious malware targeting mobile devices in 2011, with one in five adults in the UAE alone said to have experienced some form of mobile device cybercrime.

"With users in the Middle East using smartphone and Android to access the Internet more frequently for online shopping, social networking and downloading applications from sites which are a perfect environment for malware plantation, the increased risk of losing personal information is something not to be joked about," Bulent Teksoz, Chief Security Strategist, Emerging Markets, Symantec tells AMEinfo.com.

"Attackers honing in further on mobile devices in 2012 will mean that confidential data loss through these devices will be a growing issue for consumers," he adds.

In some part Android is a victim of its own success because with more people using mobile devices running on Android operating systems the more likely it is that cybercriminals will target these devices in particular.

Google Bouncer now introduced to curb threat


Google has acknowledged the threat to its users and acted upon it, recently introducing Google Bouncer, a security service for the Android platform which monitors the Android Market and picks out those thought to be malware.

"Today we're revealing a service we've developed, codenamed Bouncer, which provides automated scanning of the Android Market for potentially malicious software without disrupting the user experience of the Android Market or requiring developers to go through an application approval process," Android VP of engineering Hiroshi Lockheimer explained in a blog post.

Lockheimer added that the Bouncer service runs every new application on the Google cloud infrastructure in order to simulate how it will run on an Android device. This enables Google to look for hidden and malicious behaviour. "We also analyse new developer accounts to help prevent malicious and repeat-offending developers from coming back," Lockheimer said in his blog.

Individuals need to be aware of malicious software threat


However, Teksoz is keen to point to the responsibility of the individual to make sure they are not downloading malicious software.

"Screening processes and certification measures can definitely help in securing the Android market, however as we are seeing this threat evolving consistently and rapidly there is no substitute for users taking security into their own hands and adopting an easy-to-follow defensive strategy. A great deal of your personal information, including calendars, email, usernames, passwords, and texts are all stored on your mobile phone," he states.

"As these devices increasingly start to operate with all the functionality of a desktop or laptop, this enhances the need for organisations and consumers to adopt a consistent approach to protecting themselves across all devices from which they are accessing the Internet," adds Teksoz.

Damage of infected app can vary


The amount of damage which can be caused by downloading an infected app can vary. Some may just restart the phone or wipe its memory, others are much more dangerous and costly.

"The main problem, specifically in the Middle East is infiltrating these devices to spread infection through text messages and calls to premium numbers. For example, we are seeing users downloading what appears to be a legitimate application which will then automatically download a malicious code that proceeds to send text messages to 'premium' numbers that are being rented out by cybercriminals leaving the user with a nasty surprise when they receive their phone bill at the end of the month," reveals Teksoz.
Research reveals a significant rise in malicious malware targeting mobile devices in 2011.
Research reveals a significant rise in malicious malware targeting mobile devices in 2011.
Enlarge »
Article Options

Disclaimer »

Articles in this section are primarily provided directly by the companies appearing or PR agencies which are solely responsible for the content. The companies concerned may use the above content on their respective web sites provided they link back to http://www.ameinfo.com

Any opinions, advice, statements, offers or other information expressed in this section of the AMEinfo.com Web site are those of the authors and do not necessarily reflect the views of AME Info FZ LLC / 4C. AME Info FZ LLC / 4C is not responsible or liable for the content, accuracy or reliability of any material, advice, opinion or statement in this section of the AMEinfo.com Web site.

For details about submitting your stories, please read the guide - all content published is subject to our terms and conditions