There's been some disagreement among vendors and researchers about whether certain types of Android apps should be classified as malware, adware or something else entirely. But if even researchers can't decide, how can users? My question is, what role should enterprises have in helping users distinguish secure mobile apps from unsecure mobile apps, especially when these insecure apps could play a role in an enterprise data breach at some point?
When viruses first emerged and began to evolve, there was confusion about what to call or name malicious software. As spyware evolved in the late 1990s and early 2000s, the same debate reemerged about how to describe, classify or name the different types of emerging malware and how to differentiate them from legitimate software. Terms such as general malware, spyware, adware, potentially unwanted programs, spamware, etc., were used to define malware.
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous
This variation in terminology among vendors, researchers and the rest of the industry confuses users. That's a big part of why it can be difficult for a user to decide if an Android application is actually malware. Simply by using naming conventions that seem nonthreatening, mobile malware authors can easily make their wares appear to be secure mobile apps to the average user.
In truth, malware should be classified based on what it does, not just on where it does it or what it's named. Given the multi-platform nature of attacks and the incorporation of general operating systems in many different types of products, confusion abounds when terminology refers to a coffeemaker virus and smartphone virus as two distinct viruses when, in reality, both viruses exploit the same code in the Android Linux OS that often underpins two different devices.
Enterprises that allow bring your own device (BYOD) usage on the corporate network and allow any data to be accessed by noncorporate-managed systems -- like an employee’s home computer or external email, or allowing users to install software on their systems -- definitely have a role in helping employees securely use their own devices, including smartphones. Enterprises could suggest applications that are reasonably secure to users, but evaluating all of the hundreds of thousands of apps available to users is not possible. An enterprise could recommend a third-party application list or refer users to a company that lists applications that are reasonably secure. Helping users secure their smartphones prevents data breaches.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.