Mobile app screening has created a bit of a roadblock for malware that is infecting smartphones and tablets. I...
recently heard that "hybrid threats" are going to be an increasing mobile malware concern. Can you explain what hybrid threats are and how to mitigate their risks?
Symantec described hybrid threats as malware that starts on a personal computer and proceeds to infect a mobile device in a multi-step infection attack.
Many users connect their mobile devices to PCs to either charge them or to use the USB port for sharing files. File sharing over a USB port or via Bluetooth can result in a malicious application being installed on a smartphone without the user's knowledge.
Symantec said the Internet of Things is the next wave of malicious attacks. As people acquire more smart devices (smartphones, smart TVs or smart homes) and connect them on a regular basis, they may end up connecting to untrusted devices. Some devices may even require the smartphone or other smart device to install software that controls it. This could also be used to install malware.
The risks of hybrid threats can be mitigated largely by not connecting smartphones to infected PCs and keeping the PCs you use malware-free. In the future, we may see that connecting solely to trusted devices will be the only way to mitigate these threats.
Alternately, hybrid threats can be mitigated by only connecting mobile devices to PCs and devices that have certain trusted security software installed on them.
Connecting to untrusted devices may be necessary and common, but people will need to better secure their devices so malicious applications cannot be transferred from one device to another. Also, both disabling Bluetooth when it is not needed and not using your smartphone for file sharing will limit the device from being compromised. And while public charging stations are convenient, they could be connected to a malicious PC or device. I would advise against using any untrusted connection such as this.
Ask the Expert!
Perplexed about enterprise security? Send Nick Lewis your questions today! (All questions are anonymous.)
Related Q&A from Nick Lewis
As the Angler exploit kit evolves and adopts new functionality, it's becoming harder to detect and defend against. Enterprise threats expert Nick ...continue reading
A proof-of-concept attack on Apple's Siri allowed researchers to steal data from iOS. Learn more about the iStegSiri attack and how to defend against...continue reading
A new global email scam has cost enterprises millions. Expert Nick Lewis explains how to defend against man-in-the-email attacks with proper training...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.