Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Android
    • Android
    • Cloud
    • Cybersecurity
    • Mobile
    • Networking

    Smartphones, Tablets, Android Are Why Malware Is Going Mobile in 2012

    By
    Don Reisinger
    -
    January 17, 2012
    Share
    Facebook
    Twitter
    Linkedin

      For years, computer users’ biggest security threats were attacks against their desktop computers and applications. But cyber-criminals increasingly have been turning their sights toward mobile devices and Web applications, as they are fertile new ground for lucrative cyber-attacks.

      It won’t happen overnight, of course, and there will still be more than enough security flaws impacting Windows and other desktop platforms to keep companies like Symantec and McAfee in business for years to come. But for mobile device users, security applications are as much a requirement for them as they are for desktop computer users.

      Cyber-criminals have spent the past several years developing new attack strategies for mobile applications and devices. And this year,they’re going to try to break in every chance they get.

      Read on to find out why security threats are increasingly going mobile this year.

      1. Windows 8’s security

      According to Microsoft and the security researchers who have tried out Windows 8, the operating system will be the best yet at protecting users. In fact, some say that all users will need is Microsoft’s own security suite to safeguard their computers. That’s a major development in the Windows ecosystem. If Microsoft can actually deliver on those lofty promises, cyber-criminals may shift their attention from the desktop to online targets. But a really secure Windows 8 could go a long way toward showing the industry at large how to build security into mobile and Web applications as well as desktop applications.

      2. Cloud services are a cash cow

      Cloud services are a potential cash cow for cyber-criminals. In enterprise-focused applications, they can include bank information and Social Security numbers to just about anything else. What’s worse, enterprises and consumers accessing cloud applications are placing all their hope in the service provider to protect their data when there is a serious risk that cloud services can be penetrated by cyber-criminals, who could reap boatloads of cash from stolen information.

      3. Social networks are too

      As the Koobface worm has proved, there’s an inordinate amount of money in targeting social networking users. A new report from the New York Times claims the people allegedly behind Koobface generated millions of dollars just by taking aim at social network users. Security experts say the cyber-criminals behind Koobface are still active and it’s likely that they or copycat hackers will launch new Koobface variants or Koobface-like attacks this year.

      4. Android use is exploding

      Unfortunately,Android has quickly become an easy target for malicious hackers around the world. The operating system is the most popular mobile OS for cyber-criminals, and most security researchers believe that trend will only continue in 2012. So, why is that happening? For one thing, the operating system doesn’t have all the safeguards found in, say, BlackBerry OS. What’s more, a tremendous number of people are adopting the software each day. That presents an ever larger and highly lucrative target for cyber-criminals. Keep that in mind.

      Don Reisinger
      Don Reisinger is a longtime freelance contributor to several technology and business publications. Over his career, Don has written about everything from geek-friendly gadgetry to issues of privacy and data security. He became an eWEEK contributor in 2009 producing slide shows focusing on the top news stories of the day. When he's not writing, Don is typically found fixing computers or playing an old-school video game.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×