Android Mobile Phones Malware Reality Check: Cell Phone Attacks PDF Print E-mail

Cell Phone Attacks

There are both simple and sophisticated ways to protect cell phones from attackers in the U.S. Since phones with Bluetooth connections and data capabilities are the main targets of malware, it is generally the Smartphone that must be secured against vulnerabilities. Cell-phone threats are primarily spread in three ways, Internet downloads, Bluetooth wireless connections, and multimedia messaging service (MMS).

Many protections are built into devices, such as allowing users to set a strong, five-digit PIN code for Bluetooth devices so that access is harder to crack, and most digital phones have encryption capabilities, which reduce the chance of someone latching onto a conversation. Mobile anti-virus software is also becoming more available, which is used for various device platforms.

Cell phone use varies around the world. In Japan, cell phones are used for financial transactions similar to a credit/debit card. Other uses include watching live TV, gaming, picture enhancement, and GPS navigation. On average, Japan is approximately five years ahead of the U.S. in regards to cell phone technology.

With the advanced use of cell phones in Japan, security capabilities are advanced as well. For example, NTT DoCoMo's P903i includes security features such as face recognition and password protection in order to make financial transactions. Another protection has the owner of a cell phone keep a security chip in their pocket or purse, and anytime the cell phone is out of range, it will lock and prevent usage. These methods, plus the protections mentioned for the U.S. above, can provide greater security, however, the risk of using the Internet and data being hacked during transmission is still high. Additional protection by cell phone service providers and manufacturers need continuous improvement because the wireless technology, and threats against it, is here to stay.

Cell-phone viruses downloaded from the Internet spread the same way as a computer virus. Infected files are downloaded using the phone's Internet connection, or downloaded to a computer and then synchronized or transferred to the phone. In order to protect a cell-phone from this type of exploit the user should verify the authenticity of downloads to make sure they are from trusted sources. In addition, users should consider using mobile antivirus software and synchronize files selectively since frequent synchronizing gives the maximum opportunity for transferring infected files.

Bluetooth wireless connection threats occur when a user receives a virus via Bluetooth while the phone is in discoverable mode, thus the user should turn off Bluetooth and discoverable mode until it is needed. In order for a virus to spread via an MMS message it must be included as an attachment. In order to stop a virus propagated in this manner, the user should not open unexpected attachments.

Users should be vigilant in keeping their software current by regularly checking for new versions of operating system and applications. In addition, they must exercise caution towards suspicious attachments, downloads, and activity.

Multiple levels of defense create the most effective protection. The first layer should secure the cellular infrastructure, including transmission towers and the mobile telecommunications switching office. The second level of protection resides with phone manufacturers and software developers. The third level of protection is the end user's responsibility.

A simple step end users can take is to monitor their battery usage, since one telltale sign of active malware is a quickly drained battery. Also, users should lock their keypad when not in use to prevent unauthorized access and change passwords frequently.

Android Mobile Phones Malware Reality Check

Smartphone malware is not yet regarded as a big threat, but its coming. Malicious software is jumping from PCs to android mobile phones, malware makers target the smartphone platform in anticipation of making a quick buck. And if you can remember the infected Droid­Dream and Plankton Android apps, an infected app that was released into the Android Market with ability to infect several thousand android cellphone users' before anyone could detect the existence of the malware.

While taking note of the DroidDream incident, numerous phones that downloaded the software infected with a Trojan horse and rooted their phone and later on gave vital data like the user's location and cell phone numbers to a remote server. The very same day, Google destroyed the contaminated apps in the Android Market, and washed away the apps from phones remotely. It later issued an update to re-pair the damage which the DroidDream Trojan horse had done.

How to shield yourself

The safest way is of course to avoid unknown apps and if necessary, research apps and their publishers in detail before tapping the download button. Before you install an app, you should ensure that the apps avails a list of authorizations for services that the app should access on your phone. For example, if an app prompts to access an alarm clock, it doesn't need to access your phone's contacts list. And if something in the consent screen looks suspicious, ensure thorough precautions before you download the app.

Touch screen on android mobile phones can be very dangerous when you are surfing on the net, hence you should be on the look out of what you click while surfing the web. Some time in June, a mobile security company 'Lookout' exposed malicious advertisements aimed at android smartphone users and deliberate to swindle them into installing infected apps. A few types of mobile antivirus software, such as Lookout Mobile Security, have features aimed to protect you from malware such as these.

It is however advisable to install antivirus software on your android phone. Most big-household security companies such as McAfee, AVG, and Sy­­mantec have a downloadable cellphone app for protecting your smartphone. Aside from guarding against malware, these apps include vital abilities such as to lock and wash your phone remotely. When you purchase a new phone; it's a better to install antivirus software before you add any other apps. And you'll tremendously reduce your phone's ability to get phished against malware activities.




Antivirus Software Articles

Internet Security Software Articles

Total Smartphone Security Software Articles