& cplSiteName &

Smartphones: The New Hacker Frontier

Denise Culver
9/3/2010
50%
50%

In the first quarter of 2010, statistics show that global smartphone shipments topped 54 million – a 57 percent jump from the previous year. With such growth, it should come as little surprise that hackers are adapting their tested methods for infecting computers to attack Internet-enabled mobile and smartphones.

To date, the biggest smartphone breach occurred on Google (Nasdaq: GOOG) Android phones. Users that downloaded certain wallpaper applications actually opened their phones up to hackers who harvested the phone and voice-mail numbers, as well as data used to disclose a user's physical location. The wallpapers were downloaded more than 1 million times, and information was transmitted to a Chinese Website. In one week, Google had to take down more than 80 such applications to protect its users.

Such attacks underscore the potential for hackers that are looking at Web browsing and application downloads as two fertile fields from which they can gain valuable information. And as hackers become more creative with their efforts, there is no doubt they will turn their attentions to hacking phones used by enterprises and organizations in order to glean even more nefarious treasure.

Enterprises and organizations should be taking strong measures to counter such attacks now, as discussed in the new Heavy Reading Mobile Networks Insider report, "Mobile Security: The Coming Boom in Authentication." Companies analyzed in this report include: ActivIdentity Corporation ; Arcot Systems ; Diversinet Corp. ; Entrust Inc. ; PhoneFactor Inc. ; PortWise AB ; SafeNet Inc. (Nasdaq: SFNT); and Vasco Data Security International Inc.

The number of smartphone attacks is small compared to that of PC attacks – there are about 40 million known malicious programs that target PCs, as opposed to about 600 for smartphones. But enterprise IT professionals and mobile authentication vendors agree that the next 12 months will see an astronomical increase in the number of attacks against smartphones.

Several factors will drive those attacks. Smartphone users are not smart when it comes to protecting their information, with most still relying on simple passwords as their only form of security. Also, enterprises and organizations – especially those in the financial services and healthcare industries – are increasingly introducing new applications for smartphone users, giving hackers access to banking, credit card, and other vital information.

Smartphone protection must be implemented at the enterprise level. Companies should already utilize two-factor authentication and other security afforded by mobile authentication vendors. Once enterprises force their employees to understand the importance of protecting mobile devices, there will be a trickle-down effect to the consumer market.

Meanwhile, mobile authentication vendors must remain diligent about making their solutions affordable and simple to use. As PC users have shown, the only types of security measures that succeed are those that do not infringe on speed and utility. As vendors continue to create and market such solutions, enterprises will have no choice but to face the reality that smartphones are the new hacker frontier.

— Denise Culver, Research Analyst, Heavy Reading Mobile Networks Insider






The report, Mobile Security: The Coming Boom in Authentication, is available as part of an annual single-user subscription (six issues) to Mobile Networks Insider, priced at $1,595. Individual reports are available for $900. To subscribe, please visit: www.heavyreading.com/mobile-networks.

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
More Blogs from LR Mobile Column
Mobile operators are coming to terms with their supporting role in the mobile apps world
Radio access networks are set for radical change
After a sluggish start, mobile banking will grow exponentially in the US market through 2015
LTE mobile device sales are expected to reach anywhere from 500,000 to 1M units in 2011
China's ranks of 3G subscribers will more than double this year, reaching 40M units
Featured Video
From The Founder
Light Reading is spending much of this year digging into the details of how automation technology will impact the comms market, but let's take a moment to also look at how automation is set to overturn the current world order by the middle of the century.
Flash Poll
Upcoming Live Events
November 30, 2017, The Westin Times Square
December 5-7, 2017, The Intercontinental Prague
March 20-22, 2018, Denver Marriott Tech Center
May 14-17, 2018, Austin Convention Center
All Upcoming Live Events
Infographics
SmartNICs aren't just about achieving scale. They also have a major impact in reducing CAPEX and OPEX requirements.
Hot Topics
Juniper's New Contrail VP Hails From Google
Craig Matsumoto, Editor-in-Chief, Light Reading, 11/15/2017
Eurobites: Telefónica Reckons Plastic Is Fantastic for FTTH
Paul Rainford, Assistant Editor, Europe, 11/15/2017
AT&T's Lurie Leaps to Synchronoss as New CEO
Dan Jones, Mobile Editor, 11/17/2017
Animals with Phones
Live Digital Audio

Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.

Like Us on Facebook
Twitter Feed
Partner Perspectives - content from our sponsors
The Mobile Broadband Road Ahead
By Kevin Taylor, for Huawei
All Partner Perspectives