Norton reveals top six threats to mobile users
Company says mobile devices are ideal for attacks by cyber-criminals
The top six threats currently targeting mobile devices, according to anti-virus specialist Norton, are data loss, social engineering attacks, malware, data integrity threats, resource abuse and web and network-based attacks.
"Today's mobile devices connect to an entire ecosystem of supporting services and the typical smartphone synchronises with at least one service that is outside the user's control. At the same time, many users also directly synchronise workplace mobile devices with home computers. In both scenarios, key assets may be stored in any number of insecure locations outside the direct view of the user and the business for which they work," said Tamim Taufiq, head of Consumer Sales in the MENA region for internet security experts, Symantec.
Symantec's newly released white paper shows that while the most popular mobile platforms are designed with security features to protect the user, those security features may still be insufficient to protect the information and data on these devices.
"Norton by Symantec has already witnessed multiple attacks that exploited weaknesses inherent to the Android platform. We've also seen attempts to evade Apple's strong security with criminals employing socially engineered attacks, such as phishing, to trick people into disclosing sensitive information," said Taufiq.
The white paper shows that mobile platforms are a highly effective way for cyber-criminals to attack users through various means.
"While sneak attacks through ‘poisoned' apps and hidden malware may be obvious to the trained eye, new and unfamiliar users in particular are at high risk as cybercriminals find new ways to replicate legitimate applications, leaving the victim's data wide open for the taking. As incidents become more frequent and more sophisticated, the need for both awareness of the risks and of course the use of comprehensive mobile security is fundamental for the modern mobile device user."