Mobile malware and social malware: Nipping new threats in the bud

Mobile malware and social malware: Nipping new threats in the bud

Date: Jan 31, 2013

Social media sites and mobile devices share a vulnerability that makes them enticing attack vectors: the end user. New malware threats are targeting these consumer-oriented platforms because they tend to be less secure, and users can often be manipulated using social engineering tactics.

Case in point: Mobility is turning the workplace into a virtual enterprise, and that creates a large, under managed -- and often unprotected -- target for mobile malware. While social media and mobile device malware still pale in comparison to Windows malware, these new attack vectors will grow in popularity as malware becomes more financially lucrative. Additionally, the increasing number of social media platforms means that attackers can move from one platform to another.

In this webcast, SearchSecurity.com contributor Lisa Phifer analyzes the security posture of mobile devices and social media sites and their unique malware risks. Phifer provides an overview of how developers of mobile device operating systems and social media sites have attempted to prevent the spread of malware, and how enterprises can help prevent mobile device malware and social media malware from infecting their networks.

Editor's note: This webcast was originally recorded in January 2012.

About the contributor:
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in business use of emerging Internet technologies. Lisa has been involved in the design, implementation and evaluation of internetworking, security and management products for 30 years.

More on Malware, Viruses, Trojans and Spyware

  • canderson

    Point-of-sale security: Targeted malware, Windows XP cause problems

    VIDEO - Video: Sophos' Chester Wisniewski explains why targeted malware and the presence of Windows XP are the biggest threats to point-of-sale security.
  • canderson

    How to mitigate the risk of Web malware infections with separation

    VIDEO - Web malware is a significant threat to systems. This video explains how separation effectively reduces the risk of damage from Web-borne malware.
  • canderson

    How to analyze malware with REMnux's reverse-engineering malware tools

    VIDEO - Video: Keith Barker of CBT Nuggets demonstrates how to use the free reverse engineering malware tools in REMnux to analyze malware in apps and PDFs.
  • Undocumented iOS diagnostic features spark iPhone backdoor concerns

    News - News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.

    ( Jul 25, 2014 )

  • How the CryptoLocker ransomware was defeated with its own DGA

    News - Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.

    ( Jul 24, 2014 )

  • equipment destruction attack

    Definition - An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment. Equipment destruction attacks can be enabled simply as a result of physical access to the computer hardware, along with a tool for attack – which could also be as simple as a hammer or a cup of coffee. However, remotely-initiated malware can also be used to destroy computer equipment.
  • domain generation algorithm (DGA)

    Definition - A domain generation algorithm or DGA is a computer program used to create domain names, typically for the purpose of propagating remotely controlled Web-based malware.
  • pre-installed malware

    Definition - Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: