Malware and security risks on mobile platforms


Published on PCWorld.al

Since the 1990s, there has been a story about smart mobile phones where up to now throughout this historic period has had a great development of them.

As the functions, options, appearances of new versions have always been spectacular passing the limits of technological development. All the brands all together have had a goal of providing the most convenient and functional electronic services for the client, access to social networks, mobile banking, audio / video messages, and so on. The use of smartphones has passed all 24/7 projections larger than any other communication device.

Security threat statistics

According to a McAfee report of 2016, it is clear that threats from mobile mobile malware have increased by 150% over the last few years, and this is increasing in proportion to technological developments in the mobile.

iOS, Android and their security gaps

In the mobile domain there are different platforms but the most popular are iOS and Android. These platforms, more precisely, the app store, attach importance to the security aspect through software audits when placing a request for placement or publication. The ability to install applications from unknown sources and the black market is considered a risk. Clients or smartphone users should be very careful when searching and installing the source of this app, and in applications warehouses there is a possibility to install malicious software malware and at the time of installation they can Cause major problems. Distributing harmful malware software infects the entire device and distributes this malware to other smart mobile phones, where the attacker aims to steal data, tapping, orchestrating DDoS attacks, and spamming all this through smart phone. There are many technical gaps allowing hackers to infect and distribute a mobile malware. It mainly consists of the use of false applications constructed identically with the original and hardly identifiable.

What damages can cause mobile malware

The impact of these harmful mobile software is very high on privacy and customer security, which may be the main cause of blackmail, interception, public privacy publishing, and so on. In the category of advanced threats there are many cases that exist and have occurred, we will mention some of these events and techniques on how to accomplish:

Overcoming the protection of the official deposit system of applications, in these cases it happens that you have received a bad app and you are unaware, for various reasons asks for your bank details and at the time of sending you these go to form Not encrypted to the Hacker and not in the official Application Store because now this application is fake and does not have this communication.

Once you’ve installed a malicious mobile app that shows you that your mobile phone is infected with a virus and asks you to install another harmful app that allegedly removes the virus, it now requires you to delete the original Antivirus application in Your phone but you are unaware of this and have become a victim of the attacker.

A very dangerous feature is the self-defense of harmful mobile software, some of which are able to change your phone’s PIN or other settings and your phone becomes unusable. In some cases it may appear that a mobile application has been deleted but in reality it has not happened.

For smart phone use, you should consider these rules: Do not allow mobile applications to be installed from unknown sources, use the Antivirus application every time, read the conditions of the mobile application with focus on permissions, check For the name of the developer and the mobile app.

The role of CERTs to protect the environment or the storage of mobile phone applications can be through their labs in identifying and analyzing malware analysis, disseminating information about these harmful software to the community, Recovery or removal of these harmful software from smartphones.

Advertisements

About Buja Atdhe

CEO of the platform
This entry was posted in CyberSec and tagged , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s