Mobile app screening has created a bit of a roadblock for malware that is infecting smartphones and tablets. I...
recently heard that "hybrid threats" are going to be an increasing mobile malware concern. Can you explain what hybrid threats are and how to mitigate their risks?
Symantec described hybrid threats as malware that starts on a personal computer and proceeds to infect a mobile device in a multi-step infection attack.
Many users connect their mobile devices to PCs to either charge them or to use the USB port for sharing files. File sharing over a USB port or via Bluetooth can result in a malicious application being installed on a smartphone without the user's knowledge.
Symantec said the Internet of Things is the next wave of malicious attacks. As people acquire more smart devices (smartphones, smart TVs or smart homes) and connect them on a regular basis, they may end up connecting to untrusted devices. Some devices may even require the smartphone or other smart device to install software that controls it. This could also be used to install malware.
The risks of hybrid threats can be mitigated largely by not connecting smartphones to infected PCs and keeping the PCs you use malware-free. In the future, we may see that connecting solely to trusted devices will be the only way to mitigate these threats.
Alternately, hybrid threats can be mitigated by only connecting mobile devices to PCs and devices that have certain trusted security software installed on them.
Connecting to untrusted devices may be necessary and common, but people will need to better secure their devices so malicious applications cannot be transferred from one device to another. Also, both disabling Bluetooth when it is not needed and not using your smartphone for file sharing will limit the device from being compromised. And while public charging stations are convenient, they could be connected to a malicious PC or device. I would advise against using any untrusted connection such as this.
Ask the Expert!
Perplexed about enterprise security? Send Nick Lewis your questions today! (All questions are anonymous.)
Dig Deeper on Smartphone and PDA Viruses and Threats
Related Q&A from Nick Lewis
The BENIGNCERTAIN exploit affects certain versions of Cisco systems using the IKEv1 protocol. Expert Nick Lewis explains what the protocol does and ...continue reading
Enterprises with open FTP servers are being targeted by Miner-C malware for crypto coin mining activities. Expert Nick Lewis explains how enterprises...continue reading
MedSec and Muddy Waters Capital revealed serious flaws in IoT medical devices manufactured by St. Jude Medical. Expert Nick Lewis explains the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.