iTnews

No security winner from iPhone, Blackberry, Android

By Darren Pauli on May 17, 2011 11:35AM
No security winner from iPhone, Blackberry, Android
Linked gallery: Photos: AusCERT Day 2

Walled gardens, sandboxes equally insecure.

If you think BlackBerrys are more secure than iPhones, and Android users are simply victims in wait, then you’re wrong, according to the head of Trusteer.

Walled gardens and sandboxes do not significantly improve security nor does their absence reduce it. Rather, malware can operate effectively across all mobile environments.

“I am not a believer in sandboxing or the closed app stores,” Amit Klein said.

“At the end of the day, the security of the mobile devices will depend more on the availability of the operating system APIs to security vendors, and the ability of vendors to integrate with the devices, rather than with any feature [in the smart phones] today."

Klien said it was too early to determine which device was more secure. That decision would ultimately be decided by the availability and quality of security products for the devices, he said.

Presently, mobiles are not a big enough target for malware writers, but Klien said this would change in the next 12 months.

“We are seeing the desktop malware lifecycle being ported to the mobile world,” he said. “Browser add-ons, keylogging, plug-ins, HTML injection all of [these techniques] can be ported without much effort to make effective mobile malware”.

Back-end technologies like GUIs, databases, distributed command and control servers and encrypted traffic, and mule servers can also be ported to build mobile malware.

Malware that would take years to develop would now take months. “There are tools available to make malware move very quickly to mobile,” Klien said, adding criminals were waiting for mobile banking to become more popular.

“They will be there in months once the money is there.”

He said out-of-band channels, like SMS-token authentication, were not sufficient defences and could be all compromised by mobile malware.

Klien also expected remote-controlled botnets to be built for mobile phone platforms by the year’s end.

Defensive technologies like anti-virus and firewalls would move to mobile platforms too, but the former was ineffective, Klien said.

Banks would also harden up against malware, and look to detect infections and jailbreaks on devices, as well as securing mobile banking web sites.

Klien's statements follow news that German researchers have discovered flaws in the way Android phones handle tokens that expose application user data.

Researchers said user details were vulnerable to man-in-the-middle attacks because they did not use HTTPS, and tokens remained valid for weeks.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
androidappleauscert 2011blackberryiphonemalwaremicrosoftsecuritytrusteer

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • 11th Annual Fraud Prevention Summit 2022
  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Darren Pauli
May 17 2011
11:35AM
0 Comments

Related Articles

  • Apple's "Find My" feature created attack vector, researchers say
  • Top 5 Benefits of Managed IT Services
  • Researchers devise stealthy phone tracking without fake base stations
  • Microsoft observes destructive malware in Ukraine govt agency systems
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Digital Nation

Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.