Subscribe free to our newsletters via your
. Space Industry and Business News .




CYBER WARS
Security firms see rise in smartphone cyber-attacks
by Staff Writers
San Francisco (AFP) Sept 7, 2012


Cyber-crooks are increasingly taking aim at smartphones, following their prey as lifestyles migrate to Internet-linked mobile devices, according to new reports by online security firms.

Symantec's annual Norton Cybercrime Report released Thursday calculated that such crimes cost worldwide consumers $110 billion in the past year, with an increase in attacks on mobile devices and online social networks.

"Cybercriminals are changing their tactics to target fast-growing mobile platforms and social networks where consumers are less aware of security risks," said Norton Internet safety advocate Marian Merritt.

Lookout Mobile Security estimated that millions of dollars have been stolen from people worldwide during the past year using smartphone "malware," with a "toll fraud" virus proving to be a popular tool.

Toll fraud programs prompt smartphones to send bogus premium text messages, charges for which are added to telecom service bills. The money winds up in the pockets of the people responsible for the infections.

Toll fraud malware is designed to hide what it is doing, and charges can go unnoticed in complex mobile service billing statements, according to Lookout senior product manager Derek Halliday.

Lookout, which has more than 25 million subscribers to its service, said that in the past 12 months the amount of toll fraud viruses found on devices climbed from 29 percent to 62 percent.

"The mobile malware industry has matured and become a viable business model," Halliday said. "Toll fraud is the most prevalent type of malware."

The likelihood of being infected was highest in Eastern Europe, Russia, and China, where smartphone users get "apps" from unofficial sources instead of trusted outlets such as Apple or Google online shops, according to Lookout.

Infected apps may be made available free at file-sharing sites, discussion forums, or through links sent in messages or posted on social networks.

"There are entire systems developed to aid distribution of this malware," Halliday said.

"The bad guys are really focusing on improving and scaling their distribution techniques. They are even gaming legitimate app systems."

Cyber-criminals also create programs to boost ratings of tainted apps to make them more appealing to unsuspecting smartphone users.

Websites booby-trapped with malicious code remain the most common means of attack.

Aside from toll fraud, there is "adjacking," in which hackers take a popular application and change segments of its code so that they reap the benefit of advertising.

"When we look at the data, 12 months ago we saw a lot of evidence of experimentation that indicated malware developers were looking to see what stuck," Halliday said.

"With toll fraud they have found a business model that seems to be working; now they are trying to find a distribution model."

Nearly a third of smartphone users have received a text message from a stranger asking them to click on an embedded link or dial an unfamiliar number, according to the Norton findings.

One in five online adults told of being a cybercrime victim at a social network or on a mobile device, the Norton report found.

"We do believe it is possible to be safe on mobile," Halliday said.

"It is all about using caution when downloading apps, paying close attention to what you click on, and watching for the same kinds of threats seen on personal computers."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Caribbean sees growth in cybersecurity
Kingston, Jamaica (UPI) Sep 6, 2012
The Caribbean region is preparing for an upsurge in cybersecurity expansion as Internet safety concerns in Latin America push regional leaders toward urgent reviews of online business and government operations. The growth in the sector is a two-way traffic and a timely boon to global cybersecurity companies disappointed by slow upturn in Europe, analysts said. Recent cutbacks in U.S. de ... read more


CYBER WARS
Amazon takes on iPad with new Kindle Fire tablet

US judge OKs partial settlement in e-book case

Empire-style computers? Frenchman takes PCs to lap of luxury

Google-Microsoft field smartphones to take on iPhone 5

CYBER WARS
Intelsat General Awarded Contract in US Government's New Custom SATCOM Solutions Program

Smartphone App Can Track Objects On the Battlefield as Well as On the Sports Field

Lockheed Martin Wins Role on Defense Information Systems Agency Program

Raytheon unveils cross domain strategy to securely access information via mobile devices

CYBER WARS
First-Stage Fuel Loaded; Launch Weather Forecast Improves

NASA launches mission to explore radiation belts

ISRO to score 100 with a cooperative mission Sep 9

NASA Administrator Announces New Commercial Crew And Cargo Milestones

CYBER WARS
Monitech Announces Zero-Installation Tracking System for Automotive Industry

Lockheed Martin and Raytheon Complete First Launch Exercise for Next Generation GPS Satellites

Northrop Grumman to Supply Bridge Navigation Systems for Swire Group's Dry Cargo Ships

Mobile users wary of privacy invasion by apps: survey

CYBER WARS
Turkey looks to Lockheed's F-35 models

Chinese firm to entice Air France pilots to head to Asia

PZL-Swidnik highlights new products

'Sideways' aircraft for supersonic speed?

CYBER WARS
More than 70 percent of electronic waste management is uncontrolled

Researchers measure photonic interactions at the atomic level

Wayne State's new flexible electronics technology may lead to new medical uses

Magnetic Vortex Reveals Key to Spintronic Speed Limit

CYBER WARS
Astrium installs new terminal in Mexico to receive SPOT 6 and SPOT 7 imagery

Suomi NPP Captures Smoke Plume Images from Russian and African Fires

Remote Sensing Satellite Sends First Earth Imagery

Proba-2's espresso-cup microcamera snaps Hurricane Isaac

CYBER WARS
Indonesian lives risked on 'world's most polluted' river

Oil spill ship's officers deported from New Zealand

Chemical use inflicts mounting bill on poor countries: UN

Philippine gold mine struggles to plug waste spill




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement