About
Subscribe

Hackers target smartphones

Dr Charlie Miller, principal analyst at Independent Security Evaluators and speaker at next month's ITWeb Security Summit, urges users to have the same security awareness around smartphones as they do with PCs.

Alex Kayle
By Alex Kayle, Senior portals journalist
Johannesburg, 09 Apr 2010

]Smartphones have become the next biggest malware target, according to a expert.

Dr Charlie Miller, principal analyst at Independent Security Evaluators, says cyber criminals are primarily targeting smartphones for financial gain by attempting to steal personal information off them.

During next month's ITWeb Security Summit, being held at the Sandton Convention Centre, Miller will speculate as to whether smartphones will evolve into general purpose computers.

Malware and application attacks are the two biggest threats targeting smartphones, according to Miller.

“Often malware may be disguised as something useful but actually does something malicious. The other threat is an attack against the core applications themselves, often called drive-by-downloads. Here, the user just visits a Web site and the site exploits a vulnerability in the Web browser to run code of the attacker's choosing.”

ITWeb's 5th annual Security Summit

More information about ITWeb's Security Summit, which takes place on 11-13 May 2010 at the Sandton Convention Centre is available online here.

Miller explains that smartphones have more similarities with computers than with phones from just a few years ago. He cautions users to have the same security awareness around smartphones as they do with PCs.

“They contain relatively standard operating systems and have Web browsers. However, while computers are relatively open platforms that allow you to download and run any program you want, often phones are restrictive and only allow you to run certain applications. For example, the iPhone only lets you run applications from the AppStore.”

Miller adds that iPhones are becoming increasingly targeted by cyber criminals. He cites the example of an iPhone application developer who illicitly gathered users' cellphone numbers without their permission. He adds there have been cases where cyber criminals have deployed a worm that targets iPhones and turns the phone into a botnet.

According to Miller, smartphone users should avoid following links and downloading applications from untrusted sources. In addition, users should consider what information they make accessible on their phone if they lose it. “It is way more likely a typical user will leave their phone in the back of a than visit a malicious Web site,” says Miller.

Share