Thursday, June 28, 2012

Top 5 mobile and online malware to watch out for

Top 5 mobile and online malware to watch out for | iYogi Top 5 body { background-image:url(http://top5.iyogi.com/wp-content/themes/swagger/images/backgrounds/bg-none.png); background-position:center top;background-repeat:no-repeat;}#page-highlight {display:none;} /*only looks good with light bg, so just don't show it*/#top-menu-shadow {background:none;} /*still want the height of the element, just don't show it*/ } .section-wrapper {border:1px solid #202020;}.section-wrapper .section {background:#464646 url(http://top5.iyogi.com/wp-content/themes/swagger/images/section-bullet-2.png) no-repeat 6px 9px;color:#EEE;}.section-wrapper a.more {background:#5E5E5E url(http://top5.iyogi.com/wp-content/themes/swagger/images/arrows-more.png) no-repeat 9px 12px;}.section-wrapper a.more:hover {background:#666 url(http://top5.iyogi.com/wp-content/themes/swagger/images/arrows-more.png) no-repeat 9px 12px;}.sidebar .widget .section-wrapper {border-top:1px solid #828282;}   About UsColumnistsGet Involved USA AMERICA CANADA USA EUROPE Finland Greece France Italy Spain UK OCEANIA AUSTRALIA MORE IYOGI SITES Windows ® 8 Support by iYogiMicrosoft ® Office 2010 Support by iYogiPrinters SupportAntivirus SupportRouter SupportBrowser SupportDell ® Support by iYogiHP Support by iYogiMicrosoft ® Support by iYogiAcer ® Support by iYogiASUS ® Support by iYogiToshiba ® Support by iYogiFujitsu ® Support by iYogiSamsung ® Support by iYogiLenovo ® Support by iYogiSony ® Support by iYogiEmail Support      

        GadgetsMobileAppsSocial MediaWorkplaceInfographicsVideosMiscellania   Random Article  
   

Smartphone apps Top 5 SEO apps for smartphones Top 5 tips to become a social media darling Top 5 tips to become a social media darling Hacker alert 5 simple tips to protect your computer from hackers Apple iOS 5 Make the most of Apple’s iOS 5 in 5 simple ways mobile marketing 5 mobile marketing questions for business owners shutterstock_79029379 5 top tips to recycling your old mobile phone the internet.jpg What happens on the Internet every minute Tweet Pin It   Top 5 mobile and online malware to watch out for 0 Posted June 18, 2012 by kshitiz.sharma in Miscellania mobile device malware

Cyber crime has been on a steep rise recently. People today are getting conned and phished online more than ever before. But till recently, most of these threats were affecting PC users only and mobile device users were relatively unaffected. But now, according to Credit Union Times, this threat is more real than ever for mobile device users as well. This is owing to the extensive use of mobile devices in today’s world.

The modern cyber-criminal has shifted his sights from the PC to your mobile device. Even though most of these are more scares than actual credible threats but even then the treat is very real. So be aware, you have been warned.

Here’s how cyber theft works

Apple no longer malware proof

Apple had a reputation for being the safest computer makers. But there is a buzz in the cyber underworld that your Macbooks and iMacs are the new targets for cyber-criminals. That is owing to the fact that Apple Inc. has acquired over 5% market share in the PC market. And also the fact that most Apple Macs don’t run protection or antivirus software has made them a prime target.

The mobile devices are relatively safe but we suspect not for long. Read on…

Malware goes mobile

Mobile malware mainly consists of petty thefts such as malicious SMSs and calls to ‘unsafe’ expensive numbers that will empty your card balance or spike your monthly bill. But as mentioned above, the rise in the number of mobile device users will also cause a rise in the number of mobile banking users and experts feel mobile malware is the next big thing.

It is quite a task to get malware to run on iOS or Android but it is not impossible. Gozi is such a Trojan that can steal a phone’s IMEI (international mobile equipment identity number).

Malicious banking apps

Though experts claim the non-existence of such apps but the threat cannot be ruled out. The Android platform’s open source nature could be abused by a hacker to modify a legitimate app via a criminal code and then you could be in deep trouble.

Though Google’s Play Storefront and Apple’s App store are very vigilant on this but there are bound to be exceptions.

Phishing: The biggest nuisance

Call it user innocence or stupidity but phishing remains one of the biggest online threats in the world. In the second half of 2011, a 23% rise in phishing scams was recorded. Thanks to the smaller resolution size of the screens, mobile device users can be deceived into clicking malicious links whereas PC users might recognize the difference.

God of malware: Zeus

No we are not talking about the god of thunder but the Trojan bot that has made lives of PC owners a hell. This Trojan has infected computers in over 200 countries around the world. This thing only infects Microsoft OS systems like Windows and cannot run on Apple’s Mac or Linux systems.

But since Microsoft holds the major share of PCs worldwide, that is a worrying fact. The most dangerous part about this bot is that you don’t need to be a hacker to operate this program. It also behaves and spreads like cancer and can be designed to evade detection.

ExcerptLawrence Pingree, a researcher director at Gartner, said in an interview: “There is no silver bullet for security.”“Mobile is topic 1, 2 and 3 in the cybercriminal underworld,” said Steve Santorelli with researchers Team Cymru.

View full story
Via: Credit Union Times 

Image by Jeremy Keith,  Wikipedia

 


android, Android’s open source platform, Apple, Apple App Store, Apple iOS, Apple Mac, Apple malware, featured, Google, Google’s Play Storefront, Gozi, Gozi Trojan, Infected Microsoft Windows, iOS, Linux, Linux OS, malware for Apple devices, Microsoft, Microsoft Windows, Microsoft Windows infected, mobile and online malware threats, Mobile malware, mobile malware threats, online malware, online malware threats, PCs, Phishing scam nuisance, phishing scams, Phishing scams a nuisance, worst malware threats, Zeus, Zeus Trojan About the Author kshitiz.sharma  
Kshitij of deceptive calm and measured tread writes on many things. A versatile writer with a friendly conversational style that others try hard for but can rarely achieve, gaming and automobile technology make up his daily fix. Drag race driver, rally driver and speed junkie, every move is a love song to cars. More articles by kshitiz.sharma »
Related:   androidAppleApple App StoreApple iOSApple MacGoogleiOSLinuxMicrosoftphishing scams
mobile marketing5 mobile marketing questions for business owners samsung galaxy s35 must watch videos for the new Galaxy S 3 owners Health AppsTop 5 must have free health apps for Asians
free wi-fiIs using free Wi-Fi really safe? [infographic] App development5 rules for creating mobile apps Facebook smartphone5 reasons Facebook should make a phone…wait what?

mobile marketing5 mobile marketing questions for business owners the internet.jpgWhat happens on the Internet every minute Hacker alert5 simple tips to protect your computer from hackers
Smartphone appsTop 5 SEO apps for smartphones iPod accessoriesTop 5 must have car iPod accessories Health AppsTop 5 must have free health apps for Asians

Free iPhone apps5 free must have iPhone apps Top 5 iPhone apps your car will loveTop 5 iPhone apps your car will love
mobile marketing5 mobile marketing questions for business owners App development5 rules for creating mobile apps Facebook smartphone5 reasons Facebook should make a phone…wait what?
Apple iOS 5Make the most of Apple’s iOS 5 in 5 simple ways iPhone 5Apple iPhone 5: Features, specs and schematics surface Griffin Helo TCTop 5 must have gadgets for your iPhone

Hacker alert5 simple tips to protect your computer from hackers geek vs nerdGeeks VS Nerds, the mystery solved [infographic]

mobile marketing5 mobile marketing questions for business owners Smartphone appsTop 5 SEO apps for smartphones Facebook smartphone5 reasons Facebook should make a phone…wait what?
Productivity apps for Android phonesTop 5 free Android apps for better productivity facebook IPOFacebook IPO vs Google: where do they stand [infographic] Female nobel prize winners5 awesome things you can do with Google’s knowledge graph

mobile marketing5 mobile marketing questions for business owners App development5 rules for creating mobile apps Facebook smartphone5 reasons Facebook should make a phone…wait what?
iPhone 5Apple iPhone 5: Features, specs and schematics surface Free iPhone apps5 free must have iPhone apps shutterstock_96526669Top startups today and what we can learn from them

Hacker alert5 simple tips to protect your computer from hackers
Hacker alert5 simple tips to protect your computer from hackers Xbox 360Top 5 gaming consoles today business technology tends5 important technology trends for your business
Apple iPadTop 5 ways to use iPad as a presentation tool shutterstock_93562207The giant that is Apple [infographic]
Top 5 ways to disinfect your PCTop 5 ways to disinfect your PC
0 Comments

Be the first to comment!
Leave a Response Cancel replyName (required)Email (required)Website
Comment

Popular Recent Comments Tags
Top 5 things the new iPad can do that the old can't Top 5 things the new iPad can do that the old can’t
wordpress logos 5 reasons why your blog should be smartphone friendly
5 social media mistakes you might be making and how you can solve them 5 social media mistakes your brand is making and their solutions
WWDC 2012 logo Apple iOS 6: 10 expectations from the WWDC
iPhone 5 Apple iPhone 5: Features, specs and schematics surface
the cloud iCloud explained in 5 simple steps
Pinterest to impress your future employer 5 ways Pinterest can impress your future employer
  shutterstock_79029379 5 top tips to recycling your old mobile phone
mobile marketing 5 mobile marketing questions for business owners
the internet.jpg What happens on the Internet every minute
samsung galaxy s3 5 must watch videos for the new Galaxy S 3 owners
Hacker alert 5 simple tips to protect your computer from hackers
Smartphone apps Top 5 SEO apps for smartphones
Wi-Fi theft Top 5 tips to prevent anyone from stealing your WiFi
  "Thanks and good blog." - outsourcing Romania "DzK5Ii Muchos Gracias for your article post.Much thanks again. Keep writing." - Cheap Social Bookmarking Service "Nice post at Top 5 things the new iPad can do that the old can't | iYogi Top 5. I was checking constantly t..." - dududukkkkkkk "This is the precise Top 5 things the new iPad can do that the old can't | iYogi Top 5 journal for anyone wh..." - fkawau "I hear that apple s going to go against ford in a car competition." - Betsy Jackman "Top 5 things the new iPad can do that the old can't | iYogi Top 5 I was suggested this web site by my cousi..." - dududukkkkkkk "This is a good posting, I was wondering if I could use this write-up on my website, I will link it back to ..." - dr dre beats   androidappAppleApple iOSApple iPadApple iPhoneApple iPhone 4SAppsEditor's PickfeaturedGoogleinfographiciOSiPadiPhonePCsmartphonesocial mediaspotlightTechnology Subscribe Via Email 

Catch the latest Top5s from the universe of Technology


InfographicsSocial MediaVideos Miscellania
the internet.jpg What happens on the Internet every minute
Lies about media The Big Six decide what you should watch, see or hear
Top 5 lessons to become a smarter digital marketer Top 5 lessons to become a smarter digital marketer
free wi-fi Is using free Wi-Fi really safe? [infographic]
facebook IPO Facebook IPO vs Google: where do they stand [infographic]
  Top 5 tips to become a social media darling Top 5 tips to become a social media darling
Facebook smartphone 5 reasons Facebook should make a phone…wait what?
Pinterest to impress your future employer 5 ways Pinterest can impress your future employer
wordpress logos 5 reasons why your blog should be smartphone friendly
5 social media mistakes you might be making and how you can solve them 5 social media mistakes your brand is making and their solutions
  samsung galaxy s3 5 must watch videos for the new Galaxy S 3 owners
guide to evernote A video tutorial to Evernote
Apple is gearing up for quite a year ahead with the launch of iOS 6 and iPhone 5 Apple news and rumors you ought to know
the cloud iCloud explained in 5 simple steps
plug in hybrid Top 5 automotive technologies that’ll change the game
  shutterstock_79029379 5 top tips to recycling your old mobile phone
mobile device malware Top 5 mobile and online malware to watch out for
Hacker profile Top 5 hackers and their fates
iPhone 5 Apple iPhone 5: Features, specs and schematics surface
shutterstock_96526669 Top startups today and what we can learn from them
  RSS News from the tech universeSony, Panasonic Agree to TV Tie-Up - Wall Street JournalSamsung: Galaxy S III sales to hit 10 mln in July - The Associated PressThe New York Times Brings All Its Content to Flipboard -- and Its Pay Wall, Too - TechCrunchFujitsu bigwig: Microsoft's doing us a favour with Surface either way - RegisterGoogle TV service launches in UK - BBC NewsAsus Transformer Pad Infinity TF700 review: Infinite potential, limited OS support - CNETInvestment Banks Seek Business in Patent Deals as M&A Work Slows - Bloomberg
Sitemap Copyright © 2012 iYogi Top 5, All Rights Reserved.   top

View the original article here

0 comments:

Post a Comment

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More