Results 1 to 12 of 29
Threaded View
-
Re: Another Reason I Will Never Own an Android Phone
Well, unfortunately Sirdowski, I know quite a few who have had their mobile devices compromised. However, I don't believe I am a good one to use for a litmus test as I work in the field of cyber security and I work closely with folks like Symantec, F-Secure, Akamai, etc.
You are right and wrong that malware on smart phones is easy to prevent. In most cases, yes, it is easy to prevent if someone is looking out for that type of thing. However, how many mobile device users in the entire world think about mobile malware? I mean, there is a reason why Nigerian scammers are so successful when it comes to the ridiculous email scams that they send to people (e.g. "Help me transfer this money into your bank account and I'll give you X% of it!"). If it didn't work, they wouldn't do it.
That said, there is a lot of malware out there that can compromise someone's smart phone just from them visiting a website. There isn't anything you can do about someone else's website being compromised with an exploit kit designed to exploit vulnerabilities on a phone (or computer). The only way to figure that out is after the compromise has already happened and even in some cases the malware developers are very sophisticated and are able to run the malware behind other regular processes on the phone so any AV or IDS system may not even catch it.
Originally Posted by Sirdowski
Using third party vendors is probably one of the easiest ways to get popped with a malicious app. So, if you want to watch a couple of YouTube vids and go download some apps from third party vendors that don't adhere to the same security standards that Google Play and/or Apple Store do, then by all means. It's your phone. I wouldn't recommend it though.
Originally Posted by Sirdowski
There is some really nasty malware out there and it isn't stuff that only non-tech folks fall for.
In May some malicious hackers exploited the website belonging to Federal News Radio in what we refer to as a "drive by download attack" (sometimes also referred to as a wateringhole...but those are more targeted). All someone had to do was visit the FNR website and they stood a good chance of getting compromised depending on their operating system (Windows) and the browser they were using (Internet Explorer). About a month later (after the PRISM leaks surfaced) another group of hackers did a similar style of attack using an actual PRISM article and posted it on the Washington Free Beacon's website. To make matters worse, Drudge Report (without knowing it) linked to that very PRISM article on the Free Beacon. Now, Free Beacon only averages maybe 1500 website views per day, but Drudge Report is much more.Disclaimer: The content posted is of my own opinion.
Bookmarks