https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Image of woman touching a smartphone screen

Among the Latest Threats: Malicious Mobile Applications

As IoT security increases as a concern, many in cybersecurity are warning that mobile security also needs attention, with 84% of security professionals very concerned about the threat of malware to mobile apps.
  • Written by Marc Johnson
  • 8th June 2017

As IoT security increases as a concern, many in cybersecurity are warning that mobile security also needs attention. Jai Vijayan, who has been covering technology for over twenty years, reports that a survey of 600 security professionals carried out by the Ponemon Institute “found that 84% of them are very concerned about malware threats to their mobile applications, compared to 66% who said the same about their IoT application environment”.

These security issues not only have an effect on corporations, but also ordinary smartphone users with their own private devices. Nowadays there are a plethora of mobile apps and games, like Pokémon Go, which was a huge hit last summer, showcasing the capabilities of augmented reality. Many are overeager to try out these latest new experiences in technology.

Indeed, it goes without saying that opportunistic cybercriminals look to exploit vulnerabilities no matter where they are found. As professionals write, the threatscape is by no means limited to traditional desktop computers. Smartphones are minicomputers that contain an abundance of personal data — including banking information as m-commerce becomes ever more commonplace.

It thus should also be noted, that it’s no surprise that the following examples of some of the latest mobile exploits concern Android users — as of November 2016, Android now commands about 87.5% of the global market share for smartphones. As a result, exploits found in Android are going to be more profitable than ones in, for example, iOS. One must not forget that, “cybercrime today is very much about money”.

Around the beginning of the New Year, a fake app for Super Mario Run appeared on Android, mimicking a real iOS app that had already been released by Nintendo. This version of the app turns out to contain the “Marcher Trojan”, which demands the user’s credit card information in the Play Store, while denying access to the actual store.

In another case, some Turkish Instagram users with Android phones encountered multiple apps, which were presented in Turkish and found in the Google Play Store, promising to increase their number of Instagram followers. In reality, the apps were a phishing scheme attempting to steal login credentials, likely so that the accounts could be sold.

Sometimes malware infused apps result in one’s phone getting infected with ransomware. Recently Russian speaking Android users were targeted, demanding that the victim pay 545,000 rubles (approximately $9,100). Upon downloading the infected app, the user is asked to give it administrative rights, which requires a reboot, after which the victim is locked out until he or she pays the ransom via credit card. Because of the obscenely high price, many probably “will instead choose to buy a new phone rather than paying the crooks”.

Apps containing malware come in different forms and their methods vary, but they all prey on the trust of users. As such, especially for apps that people are eagerly waiting for, like the release of a popular game, the proverb “if it looks too good to be true, it probably is” applies. Therefore, because of the wide range of mobile exploits, users need to be vigilant. It is best practice not to trust a mobile app that appears before the expected date of release, if there have not been any reliable announcements regarding early releases.

Finally, people simply browsing for new games to play or other apps, may not have heard about it, be intrigued by it, and end up downloading one infused with malware. Ultimately one ought to follow security investigator Brian Krebs’ first security rule: “if you didn’t go looking for it, don’t install it.”

At the very least, one should research and confirm the safety of the unknown app before doing so.

Tags: Article Retail Security Technologies Vertical Industries

Related


  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.
  • Five Principles in a Zero-Trust Security Approach to IoT
    IoT devices have created vulnerability for IT networks, but a zero-trust security approach can lock down attack vectors. Here are five key principles.
  • Tactics for Successfully Selling IoT Technologies
    While this year has proven the value of digitization, many enterprises need persuasion. Experts discuss strategies for successfully selling IoT.
  • LynxSecure Datasheet
    LynxSecure is a tiny separation kernel that can be programmed to partition a modern processor into secure virtual environments. It is not RTOS. It is not a traditional hypervisor. It is smaller than a microkernel (as small as 15Kb). LynxSecure requires and leverages the hardware virtualization capabilities of certain modern CPUs to (1) establish secure […]

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Cybersecurity Crisis Management During the Coronavirus Pandemic
  • In Industrial Realm, Trustworthy Software Means Safety
  • AI at the Edge Still Mostly Consumer, not Enterprise, Market
  • Integrating Analog Controls into IIoT Systems

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

Smart and Flexible Automotive and Tire Production

20th December 2020

Unlock the Potential of Digital Transformation in Oil & Gas

15th December 2020

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Real Cyber Threats and Best Practices Cyber Security Strategy and Solutions for Smart Manufacturing

1st December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

The DOD turned to #kubernetes #containers for #IoTdevelopment to brace for rapid change. dlvr.it/RqzsLz https://t.co/t8W7coEdZN

20th January 2021
IoTWorldToday, IoTWorldSeries

Food for thought: Food and Beverage Industry eBook @ROKAutomation dlvr.it/Rqz00T https://t.co/Z3y18vuozF

20th January 2021
IoTWorldToday, IoTWorldSeries

Facility of the Future dlvr.it/Rqyzvm https://t.co/ytpsOUTtGP

20th January 2021
IoTWorldToday, IoTWorldSeries

A new day in automotive production #digitalmanufacturingsolutions @ROKAutomation dlvr.it/RqyrNS https://t.co/yxPFrBZGVg

20th January 2021
IoTWorldToday, IoTWorldSeries

Unlock the potential of digital transformation in Oil & Gas @ROKAutomation dlvr.it/RqyrBV https://t.co/kzHcGjf2OK

20th January 2021
IoTWorldToday, IoTWorldSeries

.@Airbus’s #datdriven #digitaltransformation focused on getting its existing data in order rather than just gatheri… twitter.com/i/web/status/1…

19th January 2021
IoTWorldToday, IoTWorldSeries

#EdgeNLP enables devices to do much more #NLP locally that better approximates human conversation.… twitter.com/i/web/status/1…

19th January 2021
IoTWorldToday, IoTWorldSeries

#Supplychain analytics, #digitaltwins and other tools are key to predicting COVID-19-style disruption in the supply… twitter.com/i/web/status/1…

18th January 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X