Nearly half (49 per cent) of these malicious files targeting Android devices were multi-functional Trojans that steal data from telephones (contact names, email addresses, telephone numbers, etc.), and are also capable of downloading additional modules from servers run by malicious users.
A quarter of the detected Android malware was made up of SMS Trojans. These malicious programs steal money from victims? accounts by sending SMS messages to premium-rate numbers without the owner?s knowledge or consent. A couple of years ago, these programs could be only found in the countries of the former USSR, South-East Asia, and China. Today, they are spreading around the world: in Q2 2012, Kaspersky Lab protected users in 47 countries against SMS threats.
18 per cent of Android threats detected in the second quarter this year are backdoors that give malicious users the ability to gain full control over an infected device. These programs are used to build botnets of mobile devices. For now, only a small number of all Android threats are Trojan Spy programs ? just 2 per cent of the total. However, these are the malicious programs that pose the greatest threat to users. These programs are on the hunt for the most valuable data that give malicious users access to bank accounts.
?In the near future, we expect not only more malware, but more effective and dangerous malware targeting Android. Judging from existing trends, we should expect that cybercriminals will soon shift to more personalised attacks. This is primarily about malware hunting for confidential data with which to steal money from users? credit cards?, said Yuri Namestnikov, Senior Malware Analyst at Kaspersky Lab.
Mobile threats of this kind can be handled with the help of dedicated mobile applications. Kaspersky Mobile Security and Kaspersky Tablet Security, in addition to reliable protection against information theft via malware, also ensure data stays safe even if the device is lost or stolen.
Related topics: ?Application and software security? ?Authentication and identity management? ?Computer and PC Security? ?Crime and Fraud Prevention? ?Encryption? ?Firewall? ?Hacking and intrusion prevention? ?Internet and Web security? ?Mobile and Wireless Security? ?Network Security? ?Security Companies? ?Security management and policies? ?Security threats and vulnerabilities? ?Virus, Worm, Email security, spyware and malware? ?VPN?
Print version |
Email to a friend |
Related articles
Other Security news and resources
IT Security white papers and research library
Access Control? Authentication? Data Management? Data Security? Digital Signatures? Email Security? Identity Management? Internet Security? Intrusion Prevention? Network Security? Remote access security? Security Management? Security Policies? Security Software? Security Threats? Virus Detection Software? Virus Protection? VPN? Vulnerability Assessment? Wireless Security?
Security books, guides, standards and toolkits
RFID and Smart Cards books, guides and reference documents? Biometric books, guides and reference documents? CCTV books, guides and reference documents? Intruder alarms and intrusion detection systems books, guides and reference documents? Monitoring and surveillance books, guides and reference documents? IT Governance, ISO 27001 ISO 17799 and BS 7799 toolkits? Fire, Health & Safety books, guides and reference documents
Source: http://www.securitypark.co.uk/security_article268299.html
apple live blog ohio primary cell phone jammer sandra fluke g8 summit netanyahu aipac
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.