![]() Trojans are software that appear to be useful or legitimate, but have hidden functions that are malicious. Table 1 below provides an analysis of the notable mobile malware types – which can be broadly categorised into: trojans, spyware, adware and ransomware – as well as their characteristics. These are worrying statistics, given the extent of malicious activities that can be facilitated through mobile malware. For instance, separate surveys by McAfee and have shown that only 50% of individuals have installed anti-virus solutions on their mobile devices, compared to more than 80% of individuals who have done so on their computers. Yet, individuals are less conscientious in protecting their mobile devices than personal computers today. This meant that the attack surface associated with mobile devices will only continue to grow, and that mobile devices will remain highly attractive targets for threat actors. ![]() The number of unique mobile subscribers worldwide is still increasing and is projected to reach 6.3 billion by 2030 (from 5.4 billion in 2022). These devices represent data-rich targets for cybercriminals and/or surveillance purposes. ![]() online banking, shopping and use of social media services). Mobile devices have increasingly replaced personal computers as the default device on which individuals transact and interact daily (e.g. This trend is likely to persist, as the reliance on and adoption of mobile devices continue to grow: This issue of CyberSense examines in greater detail the various types of mobile malware, and what we can do to guard against these threats.Īccording to reports by cybersecurity analysts, mobile malware has been on the rise globally both in terms of volume and its level of sophistication. ![]() With the sharp rise in malware scams affecting Android users in Singapore this year, mobile malware has gained plenty of traction for their role in facilitating malicious cyber activity. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |