Could you describe the evolving threat of the Legacy Native (LeNa) malware to Android devices, particularly now...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
that the newest version affects non-rooted Android devices? How can users whose devices don't receive the latest Android updates protect themselves from LeNa malware?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
In a blog post, Lookout Mobile Security provides some details about the LeNa malware and some potential steps Android users can take to protect their phones. The LeNa malware first uses the Gingerbreak exploit to root the phone and then the malware takes over the phone. So far, LeNa malware has only been detected on non-Google application stores. However, it is only a matter of time before attackers create malware that infects and controls a large number of smartphones in a similar manner as desktops. Smartphone OSes are generally more secure than desktop OSes, but even the most secure systems can be compromised.
One of the challenges associated with protecting smartphones against malware is that the carriers control a large part of the update process and may not deploy updates. In this case, third-party security applications can help reduce the risk of malware infection. Still, carriers should be pressured to deploy updates on a regular and reasonable schedule. Android mobile device users have many of the same preconceived notions as Mac users regarding security, namely that their devices won't be infected by the likes of the LeNa malware or have other security issues. If Google continues to strengthen the security of the Android ecosystem, the risks evolving from this expectation will be effectively reduced.
Related Q&A from Nick Lewis
As the Angler exploit kit evolves and adopts new functionality, it's becoming harder to detect and defend against. Enterprise threats expert Nick ...continue reading
A proof-of-concept attack on Apple's Siri allowed researchers to steal data from iOS. Learn more about the iStegSiri attack and how to defend against...continue reading
A new global email scam has cost enterprises millions. Expert Nick Lewis explains how to defend against man-in-the-email attacks with proper training...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.