Android users are the main target of malware

By -

new report by McAfee , malware trends and cybersecurity for the second quarter of 2012, shows the highest peak of malware samples detected in four years, and illustrates the growing threat faced by mobile devices – especially Android.

There is not necessarily anything surprising in the quarterly report. The fact that it’s essentially more of the same, with slight variations on themes from previous quarterly reports. However, the content should be reason enough for concern. The bottom line is that malicious attacks are a serious threat, and they will not disappear anytime soon.

As spread
Malicious sites are a popular method for obtaining malware. An average of 2.7 million malicious URLs were detected every month, pointing to about 300,000 domains corruptedThis gives about 10 thousand new malicious domains created every day with the express purpose of hosting malware and hijacking PCs or mobile devices unprotected.

Another method of propagation is by pendrives malware infection. Crackers put malicious code in files AutoRun running automatically when the stick is inserted into a PC. The malware can compromise the machine and look for other units connected to infect continue spreading.

The return of Botnets
Botnets have been a constant threat this year. Thanks to the efforts of security researchers, and big names like Microsoft, some of the most dangerous and prolific botnets were damaged or completely destroyed.

According to the last quarterly report, however, the winnings are apparently short. The activities of botnets are up 12 months ago, and crackers continue to develop new and smarter ways to manage and control massive armies of compromised computers. Researchers have found that Twitter is being used by some botnets to send commands to infected systems.

The Frontier Mobile
‘s most prominent in the world of mobile malware are. The change of traditional mobile phones, simply complete phone calls to smartphones, containing gigabytes of data, made the pocket computers became a favorite target of hackers.

Currently, most people are conditioned to run antimalware security software on their PCs and trained with the good sense to recognize and avoid many types of attacks. However, this mindset safety has not yet been transferred to smartphones and tablets, causing many people do not have adequate protection on their mobile devices.

The fact that many companies adopt the BYOD (bring your own device) and allow their employees to use their own personal mobile devices to connect to network resources and company data raises the stakes and makes mobile devices an even greater risk, in many cases.

Android smartphones and tablets are the main targets. Virtually all mobile malware samples detected are destined for The Google, ranging from malware that sends SMS messages, SMS or fraudulent payments, mobile botnets, spyware and Trojans that can capture or destroy data devices.

Apple’s iOS is more locked in nature, and the applications have to be approved by Apple to enter the App Store. With Android, however, is a more open platform for the project, and users are free to get applications from a wide variety of sources outside the official store of Google Play. In addition, apps for Android are not normally reviewed or controlled in any way, making it easier to deploy applications crackers that contain malware.

The report clearly illustrates that users still need to be vigilant and guard against new threats.More importantly, it demonstrates why the antimalware protection on the PC itself is not enough. You need to have the same strong protection for all your PCs and mobile devices.

He has over 5 years of experience as Online Media and Marketing Consultant, which allow him to enable companies to enhance and meet their Digital marketing goals. He has experience as both in-house and Agency Digital Marketing Experts. Ha has spent the most recent 4 years of his career focusing building Strong terms of Digital Marketing for his clients. In addition to his strengths on Building Brands and Serving Online Marketing strategy for his clients.

Comments are closed.