Mobile Malware

Mobile Malware

Geogen G. (SRM University, India) and Poovammal E. (SRM University, India)
DOI: 10.4018/978-1-5225-0193-0.ch011
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Why should everyone know about mobile malware? With the introduction of Internet of Things (IoT) and Cloud, you can't survive in a disconnected world. Thus from your home appliances to your window curtains, everything is connected to Internet which can be accessed through your hand held mobile device. Unlike Personal Computers, these devices give Hackers a greater attack landscape. Back in 2004, when the first mobile malware was introduced, we never thought that it would get such a big threat space, as we see today. So, we discuss the History of Mobile malwares and its categories with its motives. We also discuss few signs that indicate the presence of a mobile malware. To conclude we categorize the battle against malware into two namely prevention and response, which is forensically analysed using Static/Dynamic Methods/Tools.
Chapter Preview
Top

Introduction

Smartphone usage is expected to reach 2082.7 million globally this year (Number of smartphone users worldwide from 2014 to 2019 (in millions), Marlene Greenfield, Vice President, Hearst Magazines) and mobile applications are going to become more and more important than ever. Companies are looking forward to create newer innovative apps to connect with suppliers, distributors and end users. Even though mobiles revolutionized the way in which data is exchanged, and delivery of services, it also created new security challenges. Compared to PC users, mobiles are always switched on and connected but large group of mobile users are tech illiterate which makes it difficult to update mobiles with security patches, once it is sold. Major share of worries related to mobile application security arise due to:

  • No or Irregular vulnerability checking of mobile apps.

  • Poor encryption and data leakage.

  • Insecure data Storage, etc.

Malware in general covers all sorts of malicious software or codes written to harm you or your system. Let us introduce the terms one by one which are categorized as Malware:

Complete Chapter List

Search this Book:
Reset