Friday,25 April, 2025

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

Mobile Compromise: Science Fiction Or Reality?

Published Jun 5, 2012

Trend Micro, the global cloud security leader, today released a short film (http://youtu.be/9n8OZyo4nG0) to raise awareness about the risks associated with our increasing use of smartphones.

Smartphones are now outselling PCs, with 850,000 Android devices activated every day, 70m iOS devices sold in the first three months of 2012, and over 35 billion apps downloaded by the end of 2011. Cyber criminals are increasingly focusing their attention on these devices for financial gain, through targeted, persistent attacks and by hiding malware in legitimate looking mobile apps.
The video features Rik Ferguson, Director of Security, Research and Communication, presenting a real-time hacking scenario which takes us behind the scenes as a cyber criminal looks to exploit his victims. The video shows how a simple app can transform a smartphone into an espionage tool in the hands of criminals - recording conversations, stealing text messages and spying on private meetings. It also details the dangers of downloading un-vetted applications from third party app stores. Unfortunately, users often leave their smartphones unprotected in the belief that they cannot fall victims to crime, making the hacker’s job even easier.

"Cyber criminals are looking for an easy way to make money and are targeting smartphones through the use of social engineering techniques in order to capture both personal and company confidential information”, said Ferguson.

“Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your conversations, steal your text messages and spy on your private meetings,” added Ferguson.
As with most cybercrime today, smartphones infected with malware will not typically show signs of unusual activity. Here are some simple measures you should take in order to protect your smartphone:
• Always lock your device with a password
• Stick to the official app distribution channels, however tempting other offers may sound
• Check the publisher’s reputation and the permissions
• Invest in effective mobile security and management software

About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks