Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Mobile malware increased by 273 percent in the first half of this year, with cross-platform Trojans dominating the landscape, according to vendor research.
The year-on-year increase in malware for smartphones and tablets means one new strain was detected every 12 seconds on average, G Data said.
“At the moment, the perpetrators mainly use backdoors, spy programs and expensive SMS services to harm their victims," G Data security evangelist Eddy Willems said.
"Even though this special underground market segment is still being set up, we currently see an enormous risk potential for mobile devices and their users.”
G Data found that most of the viruses were designed to enable spamming or other criminal activities from the eCrime service catalogue.
In particular, a malicious application called ‘Zsone' was spread via the Google Android Market. This Trojan sends subscription registrations to Chinese premium SMS numbers and, because the registration confirmation is also intercepted, users detect the scam only when they check their bills.
Research by Kaspersky Lab found that threats designed for Android represent approximately 23 percent of the total number detected for mobile platforms. It highlighted the Nickspy Trojan, the distinguishing characteristics of which include an ability to collect information about a phone's GPS coordinates and any calls that are made from the device.
The Nickspy Trojan can also record conversations taking place over the device; these audio files are then uploaded to a remote server managed by the malicious owner.
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.