Viruses threaten mobile devices
COMPUTING| March 28, 2012, 11:30 a.m.
By Fred Mitchell, Symantec Business Unit Manager at Drive Control Corporation
The world has become increasingly mobile over time and technology has evolved so that cellphones have become smartphones, along with tablet PCs and other mobile devices allowing always on connectivity. Such devices have revolutionised the way we work and have grown exponentially in popularity in recent years, largely due to the fact that these mobile devices all feature Internet connectivity, opening the ‘Pandora’s box’ so to speak.
This connectivity opens up new avenues for cybercriminals with malicious intent to exploit users. Therefore, security applications for mobile devices can be regarded as the next killer app.
In the cybercrime industry, as with any profitable business, the smart enterprise goes where the customers are. As more users migrate onto a variety of mobile platforms, from BlackBerry to Android, Windows Mobile, Apple Mobile OS and even tablet devices, cybercrime is increasingly targeting these platforms as methods for the perpetration of a variety of malware, including viruses, spam and spyware, all with the express purpose of making money.
Enter the virus killer app for your mobile device
Users are now vulnerable to viruses that can shut down their smartphones; identity theft as a result of spyware and the entire gamut of threats that were once the exclusive realm of computers. As a result, mobile security is becoming increasingly important for users to protect themselves from falling victim to malicious activity.
Aside from the threat of malware, the increasing trend towards mobility along with tools such as push email functionality also means that more and more personal and business information is now stored on highly portable devices. The greater the levels of portability, the greater probability that the device, and the information it holds, may be lost or stolen. Having personal and business critical information falling into the wrong hands is undesirable for obvious reasons, and the ability to remotely wipe the device in the event of it being misplaced is another strong reason as to why mobile security is so important in today’s world.
What to do?
When looking for a mobile security solution to protect devices such as smartphones and tablets from malware and to ensure personal information does not fall into the wrong hands, there are several features to look out for, which take care of security in the event of loss or theft and also help to prevent malware attacks from causing problems on the device and prevents cross-infection of other devices.
Remote locking capability is one crucial feature, which lets you remotely disable a lost or stolen phone to prevent strangers from accessing private information. It also prevents thieves from actually using the device, so that they cannot run up large phone bills at your expense. This, combined with SIM card locking capability, which instantly locks your phone if its SIM card is removed so thieves cannot use it with a different SIM card, ensure that even if your phone is stolen, the thieves will not profit from it as the device is effectively rendered unusable.
Remote wipe is also critical, as this lets you actually erase all of the information contained on your phone if it is lost or stolen, including contacts, text messages, call history, browser history, bookmarks, and any data on the phone’s memory card. Mobile threat protection will detect and remove malware such as viruses and other threats without affecting phone performance, and download threat protection will automatically scan all files and app updates for threats.
Aside from these now vital security components, a comprehensive mobile security solution also lets you block calls and text messages from specific phone numbers, perfect for getting rid of annoying spam SMS’s and unwanted callers.
Mobile devices are increasingly common, which makes them more and more vulnerable to attack. Protecting all of the personal information stored on your mobile device is of the utmost importance to prevent all too common issues such as identity theft, and mobile security is no longer a nice to have, but a necessity for both consumer and business users in the modern world.
MORE COMPUTING NEWS
ITU to build united front against technology fakersITU will host high-level talks in a bid to improve global coordination in the application of information and communication technologies (ICT) as part of strategies to combat counterfeit and substandard ICT devices. Read More
More Congo-Brazzaville women linking up with ICTsMore women are moving to learn to use ICTs in DRC, say ‘backyard’ teachers. Read More
Has the operating system become a modern day utility?As we make the shift to the cloud era, computing’s traditional building blocks, including the operating system, are increasingly abstracted away, says Red Hat. Read More
Congo Brazzaville’s BantuHub offers ICT relief to localsThe BantuHub ICT centre in Brazzaville is a real cure for techentrepreneurs, bloggers, start-ups and other technology-minded people seeking a quick and an effective relief for their ICT headaches. Read More
Innovative products and professional services give Schneider Electric and end users the edgeRecognising enterprises' need for a specialist partner, Schneider Electric has developed its professional services based on using technology to improve end users’ efficiencies and communications, while making current and new markets accessible to them in faster, more competitive ways. Read More
Brocade appoints new Senior Director of Technology, EMEAIndustry veteran Brian Levy will lead regional growth and operational excellence, further strengthening the Brocade leadership team. Read More
Electricity in Africa: is payment the problem?While prepaid meters go halfway to solving the problem, making payment points widely available for people to purchase prepaid electricity vouchers is just as important, says Nomanini. Read More
Overcoming the challenges of location independent computingAchieving true location-independent computing requires an application performance platform that maintains visibility no matter where or when the applications are located or accessed, says Riverbed. Read More
Vodacom: cloud computing is IT industry game changerVodacom Business Nigeria says cloud computing will address all issues relating to reduction in cost of operating business in the country, but it lamented that businesses in the country are still lagging behind, with only a third of them currently using cloud technology. Read More
FEATURED STORYMFarmer SMS redefines market access for Ugandan farmers
Ugandan smallholder farmers are benefitting from an ambitious innovative ICT mobile phone initiative that offers weather reports and up-to-date market information about changes in prices for agricultural commodities, thus granting them lucrative returns from their farming ventures.
BEST READ NEWS
IN DEPTHiProcure delivers inputs to farmers’ doorsteps using ICTs
An innovation dubbed iProcure is already being used by several agro input firms which are now relying on it to distribute their products to farmers.
COMPANY NEWSSchneider Electric signs exclusive off-grid solar distribution agreement with Zimbabwean firm
Schneider Electric has announced the signing of an exclusive agreement with Samansco, a Zimbabwean renewable energy, back-up power and appropriate technology company.SAP Innovation Helps The Global Fund Fight AIDS, TB and Malaria in Africa
Extending a longstanding partnership, SAP is a founding member of The Global Fund’s new Innovation Coalition to support disease prevention and treatment.