What's the best way to protect against Trojans on mobile phones, particularly SMS Trojans that try to steal SMS...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
messages? Is there a way to encrypt SMS messages between mobile phones in the enterprise?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
How to secure a smartphone in the enterprise has been covered in a previous Ask the Expert question, and he same security steps will likewise protect smartphones from Trojans that steal SMS messages.
Many applications, especially those installed on Android-powered smartphones, will request more permission than necessary and may even request access to SMS messages when not needed. Users may not carefully review the access they are granting to an application when it is installed, and may allow an application access to SMS messages when not necessary. This user behavior is exactly what attackers try to exploit. Instruct users to carefully review if an application needs access to SMS messages before granting it permissions and/or installing the application.
To further protect against rogue or Trojan applications that could gain access to SMS messages, users can encrypt the messages. There are ways to encrypt SMS messages sent between mobile phones using available applications. TextSecure is one product that allows users to send and receive encrypted text messages in transport and store them on the smartphone. Both the sender and the receiver need to have TextSecure installed, but this process requires no other configuration besides a password. Using this application could enable the secure usage of SMS messaging. There are also commercial applications like Protected SMS that can be used in the corporate environment.
Dig Deeper on Smartphone and PDA Viruses and Threats-Setup and Tools
Related Q&A from Nick Lewis
Locky ransomware has borrowed features from Dridex malware, which focused on attacking banks. Expert Nick Lewis explains Locky's techniques and how ...continue reading
The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks ...continue reading
MouseJack, a wireless mouse and keyboard security flaw, allows attackers to type malicious commands. Expert Nick Lewis explains how enterprises can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.