Android mobile malware increases 3,325% in last seven months of 2011

Juniper Networks has released the findings of its 2011 Mobile Threats Report, which reveal that mobile malware has reached a new stage of maturity. The report, conducted by the Juniper Networks Mobile Threat Center uncovered evidence of accelerating attacks on mobile devices:

There is now more malware than ever before. 2011 saw a record number of mobile malware attacks – particularly to the Google Android platform. In addition, mobile malware has become more intelligent as cybercriminals continue to hone their craft by finding new ways to exploit vulnerabilities and human behavior for profit across all mobile platforms and devices.

 

Perhaps of greatest concern is that the barrier to creating mobile malware remains low. Juniper’s datashows an evolution from sophisticated, complex and deep technical attacks to schemes that are lightweight, social and able to deliver fast profits. As mobile users download more applications than ever before, applications themselves are becoming the ‘killer app’ for hackers and the most popular way to compromise devices.

The Juniper Networks Mobile Threat Centre examined more than 790,000 applications and vulnerabilities across every major mobile device operating system to inform its 2011 Mobile Threats Report.

“The rapid growth in mobile malware combined with ongoing concerns about lost and stolen devices illustrate just how important of an issue mobile security is – and that it is an issue that affects everyone, not just corporations,” said Dan Hoffman, chief mobile security evangelist at Juniper Networks. “We believe building trust in mobility is just as important as building great networks and powerful applications.”

Sanjay Beri, vice president and general manager, Junos Pulse Business Unit, Juniper Networks, added: “It is vital that consumers and businesses take the necessary security precautions when using mobile devices. Securing mobile devices requires a combination of safeguarding connections from interception, securing data in transit from prying eyes or theft, protecting against fast-propagating malware, possessing the tools to manage devices and apps, and securing the data, usernames and passwords on them in the event that they are lost or stolen.”


RECENT ARTICLES

New DC BLOX fibre route enhances southeast connectivity

Posted on: May 17, 2024

DC BLOX has announced that its new dark fibre route connecting its Myrtle Beach Cable Landing Station (CLS) to Atlanta has been completed. This unique high-capacity East-West route serves as

Read more

EchoStar to provide 5G services for U.S. Navy’s spiral 4 programme

Posted on: May 16, 2024

EchoStar Corporation has announced they have been awarded an indefinite delivery, indefinite quantity (IDIQ) contract as part of the U.S. Naval Supply Systems Command Spiral 4 wireless products and services

Read more