Mobile threats should be on everyone's radar

September 2011 Infrastructure, Information Security

The security space is constantly evolving. As fast as technology is changing, cyber criminals with malicious intent are never far behind, adapting their methods to take advantage of new ways of attack.

Cyber crime has become a more profitable industry than the drug trade, and as a result the malicious software now developed is no longer about simply causing a nuisance, but has evolved into a sophisticated scheme aimed at stealing sensitive information in order to make a profit. Methods like spear phishing are aimed at obtaining this information through a highly targeted attack that uses personal details and information to make the attacks seam more genuine, and this method is gaining popularity. Other trends to look out for include the growing use of shortened URL links in spam e-mails to disguise the nature of the link and the use of languages other than English in malicious mails depending on region.

One trend however that stands out as something that is set to explode in growth is the move away from threats that only target the Windows operating system. In the past, because Windows owned such an overwhelming majority of the market, it made sense for cyber criminals to focus their activities in this space. However as Mac and other non-Windows operating systems have gained market share they have increasingly become the target of attacks over the years, as there is now profit to be made by aiming at these users. This move has also been fuelled by the massive growth of the smartphone and tablet PC market, and as these devices have become more mainstream they have become at greater risk as targets for malicious intent.

The use of smartphones, and now of tablet PCs, to access the Internet, has grown exponentially over the last few years, especially in emerging markets such as South Africa, where a large percentage of the population uses their phone as their means of accessing the Web. Mobility is by no means a new thing, but the sheer proliferation of its use in recent times as well as an increasing drive for constant connectivity has greatly increased the risk associated with using these devices.

One mistake users make is in assuming that these devices are safe to use for browsing. However the reality is that they are at risk for the same threats that attack PCs and computers, as spam e-mails are often pushed to the devices through in-built e-mail capability and malicious links could just as easily contain harmful software that could attack the phone. Specific viruses are now being written for phones, and there is now a range of viruses and Trojans aimed particularly at these mobile devices, sent through SMS, MMS and e-mail, with the intent once again of stealing information.

The other risk is that often these mobile devices are connected to a network in a home or office environment. Malicious tools that infect mobile devices may not affect the phone directly, but they can sit dormant until the user connects to a network and can then affect the network in the same way as computers accessing the network can. This makes it vital for organisations of all sizes as well as personal users to protect their smartphones and other mobile devices in the same way they would protect their PCs and networks.

Solutions are now available for mobile devices that offer protection against malicious threats as well as against unauthorised access to information. These solutions provide similar protection for mobile devices including anti-virus technology and firewalls, as well as additional functionality including SMS anti-spam protection. And with ever tightening compliance regulations for enterprise, mobile protection solutions can help to ensure that users with such devices do not compromise the internal and external security compliance requirements of businesses.

The rule of thumb is that information must always be protected, no matter the device on which this information sits. With the dramatic increase in mobility and the growing number of users who now have multiple devices this has become a more complicated process. Protecting all network accessing devices from malicious software is becoming a necessity, but software is not enough and a comprehensive backup strategy needs to be in place that covers all of the devices used to store and access information.

The reality is that the more portable a device, the more likely it is to get lost or stolen, and with people now using these highly portable devices to work from as well as their PCs, multiple versions of documents exist across multiple platforms which need to be backed up. These mobile devices need to be synced to PCs and the network to ensure the correct information is backed up.

Protecting information is a two-fold process that has become even more important with the growth of mobility and constant connectivity. A combination of the latest protection software with a comprehensive, all encompassing backup strategy is the best way to ensure organisations and individuals do not fall foul of the ever increasing number of threats in the cyber world.

For more information contact Fred Mitchell, Drive Control Corporation, +27 (0)11 201 8927, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.