(MENAFNEditorial) Dubai, United Arab Emirates
High-risk and dangerous applications targeting users of Google's Android platform increased from nearly 30,000 in June to almost 175,000 in September, according to the security roundup report for the third quarter of 2012 released today by the global cloud security leader Trend Micro Incorporated.
The fact that only 20 percent of Android device owners use a security app does not help. Users need to understand what permissions apps seek, before approving them and unintentionally sharing sensitive information.
While some apps are clearly criminal – such as those that secretly purchase premium smartphone services – others are more of a privacy threat. These include "Aggressive Adware" apps that collect more personal information than the user has authorized. App developers may even be aware of the problem, thanks to the existence of rogue ad networks.
Though most adware is designed to collect user information, a fine line exists between collecting data for simple advertising use and violating one's privacy. Because adware normally collect user information for legitimate purposes, they can serve as an effective means to gather more data than some would want to give out.
"It's actually no surprise that we see such a huge increase in mobile malware. Android is the dominant smartphone platform with an amazing success story. The digital underground reads the statistics and analysts reports as well, and they figured out way to make money with mobile malware. And unlike your computer, getting information from your phone also reveals your location, the phone numbers you have called – and more – all stuff which could be sold. Our report digs deep into mobile malware, a must read!" said Raimund Genes, CTO, Trend Micro.
Notable trends in Q3 2012:
•Dangerous zero-day exploits targeting Java and Internet Explorer (IE) were found. The IE vulnerability was used in an advanced persistent threat (APT) campaign.
•ZeroAccess malware, sometimes found on peer-to-peer (P2P) sharing sites, were the top infector in the computing public this quarter. The old DOWNAD/ Conficker worm came a close second.
•PayPal attracted the most phishermen while Linkedin topped the list of chosen Blackhole Exploit Kit targets.
•See that spam? It likely arrived via Saudi Arabia (or India).
•Corporations and governments were still viable APT targets. Lurid and Nitro APT campaign improvements were also noted.
•Social media threats and privacy concerns lived on
Supporting assets:
"The Growing Threat of Mobile Malware" http://about-threats.trendmicro.com/us/mobilehub/mobilereview/rpt_mothly_mobile_review_201209_the_growing_problem_of_mobile_adware.pdf
"US 2012 Election Apps May Lead to Data Disclosure" http://blog.trendmicro.com/trendlabs-security-intelligence/us-2012-election-apps-may-lead-to-data-disclosure/
"More Adware and PLANKTON Variants Seen in App Stores" http://blog.trendmicro.com/trendlabs-security-intelligence/more-adware-and-plankton-variants-seen-in-app-stores/
"Apps As Browers: Can You Trust Your Mobile Apps" http://blog.trendmicro.com/trendlabs-security-intelligence/apps-as-browsers-can-you-trust-your-mobile-apps/
"Only 20% of Android Mobile Device Users Have a Security App Installed" http://fearlessweb.trendmicro.com/2012/misc/only-20-of-android-mobile-device-users-have-a-security-app-installed/
"Blackhole 2.0 Beta Tests In The Wild?" http://blog.trendmicro.com/trendlabs-security-intelligence/blackhole-2-0-beta-tests-in-the-wild/
The Report is available@
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-3q-2012-security-roundup-android-under-siege-popularity-comes-at-a-price.pdf
Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.