Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
UCS Invicta: Integrated Flash
Deploy flash memory technology to
deliver peak workload performance.

Find out more>>
Apple/Mac
Is your endpoint data protected?
Average Rating:
Rate this article:  
Report: Users
Report: Users' Behavior Key Driver for Mobile Security Risks

By Barry Levine
February 13, 2013 11:26AM

    Bookmark and Share
The Blue Coat Systems report noted that mobile threats last year "were a relatively small but growing percentage of overall traffic." It said "mobile malware that truly breaks the security model of the phone is still in its infancy," with few attacks except for some on Android. The third quarter of 2012 alone saw a 600 percent yearly increase in Android malware.
 


Mobile malware is "still in its infancy," but key threats come from risky user behavior, like visiting porn sites or downloading unverified apps. And, as the largest mobile platform, Android's vulnerabilities are increasingly being targeted. Those are some of the key takeaways in a new report on mobile security.

Online security firm Blue Coat Systems' 2013 Mobile Malware Report is subtitled How Users Drive the Mobile Threat Landscape. As mobile malware increases, the report said, one of the biggest drivers of security problems is user behavior. This includes responding to spam or phishing, or visiting porn sites, where "the risk of finding malicious content is nearly three times as high as any other behavior." User behavior in mobile environments, the report said, is "the Achilles' Heel."

The other user-driven behavior is really a large trend, not specific individual behavior. The "bring your own device," or BYOD, movement is the bane of many IT departments, but the desire on the part of employees to use their own phones, tablets or other mobile devices appears to be a permanent part of the landscape. A recent IDG Global Mobility Study, for instance, found that 70 percent of employees using corporate networks employ a personally owned smartphone or tablet, and 80 percent of employees access their corporate e-mail from personal devices.

'Goes with the Territory'

Laura DiDio, an analyst with Information Technology Intelligence Consulting, noted IT departments are "weary" of BYOD but, with Android being so popular and with employees determined to use their own devices, handling mobile security threats "goes with the territory."

The Blue Coat report noted that mobile threats last year "were a relatively small but growing percentage of overall traffic." It pointed out that "mobile malware that truly breaks the security model of the phone is still in its infancy," with little evidence of such attacks except for some that have targeted the Android platform. In the July to September 2012 period alone, Blue Coat saw a 600 percent increase in Android malware over the same period in 2011.

Employees should be aware that some user-directed attacks might be more successful on a mobile device than they otherwise would, according to the report. It pointed to the example of a grammatically correct, perfectly formatted Paypal phishing e-mail that said suspicious activity had been detected on the user's Paypal account. The e-mail added that the account was blocked until the user verified it by clicking on the enclosed link.

Fake Angry Birds Download

But, as is typical on a mobile device, the link was shortened by a service such as bitly, a user cannot hover over the link to see the true URL, and users expect a mobile Web site, even a fake one that was the target of such a link, to look and act differently than desktop ones. In fact, mobile versions of legitimate Web sites are sometimes hosted by entities other than the actual owner.

Mobile ads are another vulnerability that prey on user behavior. Several other security firms, such as Lookout Mobile Security last July, have noted that some ad providers, while not cybercriminals, are using their ads in free mobile apps to access personal information without the user's notification or consent.

The Blue Coat report said mobile ads were the fourth-ranked threat vector for mobile users, including fake ads offered by cybercriminals. In one example, a fake ad led to a fake Angry Birds download, which delivered a Trojan that sent premium text messages to the malware host, running up a bill without the user's knowledge.
 

Tell Us What You Think
Comment:

Name:



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Apple/Mac
1.   Android Hits 85% Market Share
2.   Apple's Content Delivery Network Live
3.   New App To Manage Time Better
4.   MacBook Pros Get Update, Price Cut
5.   U.S. Firms Fish for Growth Overseas


advertisement
New App To Manage Time Better
Helping to organize your busy life.
Average Rating:
Apple Digital Book Settlement Set
But company still appealing decision.
Average Rating:
U.S. Firms Fish for Growth Overseas
Tech trendsetters are going abroad.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Ruling Against Microsoft Raises E-Mail Privacy Concern
Microsoft has been ordered to hand over e-mails to law enforcers in the United States as part of a criminal investigation, even though the e-mail is stored at a data center in Dublin,Ireland.
 
Twitter Buys Password Manager Startup Mitro
Following on the heels of another acquisition earlier this week, Twitter is adding to its fold a password-manager security startup called Mitro, which in turn is releasing its code as open source.
 
Government Requests for Customer Data Skyrocket
Requests for customer data from the government jumped 50 percent in the first half of 2014, according to Twitter, which received more than 2,000 requests for user info from gov't agencies.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.