|
||||||
Apple’s App Store generates millions of dollars, so one can confidently conclude that it will one day be abused and will unintentionally offer malware to the unsuspecting iPhone community. It has already happened to the Symbian and Android platforms, for which a few malicious applications were unintentionally signed. The damage this time is likely to be even greater than on other platforms, because of the iPhone’s popularity and the general belief that the Apple Mac environment is safe. iPhone’s connectivity is another important reason to attract new malware. iPhones are particularly easy to use to access the internet. According to AdMob, one of the world’s largest mobile advertising networks, 40% of all online advertising requests come from iPhones, as of May 2010. This opens up the iPhone to a wider variety of internet vulnerabilities, as malware can be downloaded from infected or malicious websites. And once an attack infiltrates your iPhone, the consequences can be unpleasant, costly or even more. |
||||||
Up close and personal |
||||||
Imagine that your trusty personal assistant betrays you. Indeed, this is comparable to what mobile malware can make your iPhone do. Your iPhone has your closely guarded personal information, including photographs, contact database, possibly your credit card details, banking information, email exchanges, personal address, and a lot more. Consider the scenario in which the evening tabloid team barges into your living room and exposes your life publicly overnight. This is exactly what mobile spyware can do once it has entrenched itself in your iPhone; this insidious, crafty malware can secretly tap your phone calls, record and transfer SMS, MMS and email messages, locate you geographically, listen to your surroundings, take pictures, downloads contacts, log activity… or steal your online banking credentials like the infamous Eeki worm did. The potential damage is endless and apart from organisations such as the Electronic Frontier Foundation, only few people really take this matter seriously. |
||||||
The battle has just begun |
||||||
Recently, Fortinet observed a strong increase in new mobile phone spyware. This growth affects all platforms including iPhones, Symbian or Windows Mobile. Since March 2009, the FortiGuard team has already added detection for nine new mobile malware families. Of course, there are quite probably more to come, in particular with the development and marketing of software suites dedicated to creating mobile phone spyware, with end products being sold for tens to over thousands of dollars. These naughty companies even advertise publicly, with touted claims they can help with issues such as parental control, employee monitoring or video surveillance, legally or not. As long as end users keep thinking that spying is fine or that they have nothing to hide, spyware will continue to spread. Yet even if you have the feeling your life can be 100% transparent and that you have nothing to hide (is this possible?), spyware is still an invasion in human privacy, which takes our humanity back in time. Maybe we should remember ourselves that even our ancestors felt that privacy was an important thing to protect. The Universal Declaration of Human Rights, article 12 states: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.” |
||||||
How to behave with your iPhone? |
||||||
At this stage, iPhones’ and other mobile phones’ security is only in its infancy, and like with children, perhaps one of its highest needs is education. Yes, your iPhone must be educated, by mobile operators, phone vendors, security companies and yourself. Here are some guidelines on how to teach it caution and how to behave:
FortiGuard Subscription Services provides comprehensive Unified Threat Management (UTM) security solutions to organisations capabilities to enable protection against content and network level threats. http://www.fortiguard.com/ |
||||||
Latest posts by (see all)
- Avaya considering $5 billion buy out - March 27, 2019
- Mitel Appoints Graham Bevington as EVP and Chief Sales Officer - April 10, 2015
- Exertis is the New Name for Micro-P - October 24, 2013