Mobile app screening has created a bit of a roadblock for malware that is infecting smartphones and tablets. I...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
recently heard that "hybrid threats" are going to be an increasing mobile malware concern. Can you explain what hybrid threats are and how to mitigate their risks?
Symantec described hybrid threats as malware that starts on a personal computer and proceeds to infect a mobile device in a multi-step infection attack.
Many users connect their mobile devices to PCs to either charge them or to use the USB port for sharing files. File sharing over a USB port or via Bluetooth can result in a malicious application being installed on a smartphone without the user's knowledge.
Symantec said the Internet of Things is the next wave of malicious attacks. As people acquire more smart devices (smartphones, smart TVs or smart homes) and connect them on a regular basis, they may end up connecting to untrusted devices. Some devices may even require the smartphone or other smart device to install software that controls it. This could also be used to install malware.
The risks of hybrid threats can be mitigated largely by not connecting smartphones to infected PCs and keeping the PCs you use malware-free. In the future, we may see that connecting solely to trusted devices will be the only way to mitigate these threats.
Alternately, hybrid threats can be mitigated by only connecting mobile devices to PCs and devices that have certain trusted security software installed on them.
Connecting to untrusted devices may be necessary and common, but people will need to better secure their devices so malicious applications cannot be transferred from one device to another. Also, both disabling Bluetooth when it is not needed and not using your smartphone for file sharing will limit the device from being compromised. And while public charging stations are convenient, they could be connected to a malicious PC or device. I would advise against using any untrusted connection such as this.
Ask the Expert!
Perplexed about enterprise security? Send Nick Lewis your questions today! (All questions are anonymous.)
Dig Deeper on Mobile security threats and prevention
Related Q&A from Nick Lewis
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks ...continue reading
How was the ATMitch malware able to loot cash machines, then delete itself? Expert Nick Lewis explains how the fileless malware works and how it ...continue reading
DoubleAgent malware is a proof of concept for a zero-day vulnerability that can turn antivirus tools into attack vectors. Expert Nick Lewis explains ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.