Android mobile malware increases 3,325% in last seven months of 2011

Juniper Networks has released the findings of its 2011 Mobile Threats Report, which reveal that mobile malware has reached a new stage of maturity. The report, conducted by the Juniper Networks Mobile Threat Center uncovered evidence of accelerating attacks on mobile devices:

There is now more malware than ever before. 2011 saw a record number of mobile malware attacks – particularly to the Google Android platform. In addition, mobile malware has become more intelligent as cybercriminals continue to hone their craft by finding new ways to exploit vulnerabilities and human behavior for profit across all mobile platforms and devices.

 

Perhaps of greatest concern is that the barrier to creating mobile malware remains low. Juniper’s datashows an evolution from sophisticated, complex and deep technical attacks to schemes that are lightweight, social and able to deliver fast profits. As mobile users download more applications than ever before, applications themselves are becoming the ‘killer app’ for hackers and the most popular way to compromise devices.

The Juniper Networks Mobile Threat Centre examined more than 790,000 applications and vulnerabilities across every major mobile device operating system to inform its 2011 Mobile Threats Report.

“The rapid growth in mobile malware combined with ongoing concerns about lost and stolen devices illustrate just how important of an issue mobile security is – and that it is an issue that affects everyone, not just corporations,” said Dan Hoffman, chief mobile security evangelist at Juniper Networks. “We believe building trust in mobility is just as important as building great networks and powerful applications.”

Sanjay Beri, vice president and general manager, Junos Pulse Business Unit, Juniper Networks, added: “It is vital that consumers and businesses take the necessary security precautions when using mobile devices. Securing mobile devices requires a combination of safeguarding connections from interception, securing data in transit from prying eyes or theft, protecting against fast-propagating malware, possessing the tools to manage devices and apps, and securing the data, usernames and passwords on them in the event that they are lost or stolen.”


RECENT ARTICLES

Aston University expert leads UK-Japan AI malware detection research

Posted on: May 8, 2024

An Aston University business analytics expert has been awarded a grant to spearhead a UK-Japan research partnership on artificial intelligence (AI)-driven malware detection in 5G and 6G networks and the

Read more

Mavenir and AWS join forces to optimise cloud-native telecom deployment

Posted on: May 7, 2024

Mavenir has announced the signing of a five-year Strategic Collaboration Agreement (SCA) with Amazon Web Services (AWS) set to influence the deployment of telecom workloads running on the AWS. The

Read more