Share

Related Links

  • ESET
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Related Stories

  • Two Android viruses circulating in the wild
    Two Google Android viruses have been spotted circulating and infecting users’ smartphones in the wild. The viruses are potentially nasty because one - SW.SecurePhone - uploads data to remote servers from the users' handset, whilst the other - SW.Qieting - auto-forwards messages to a remote number.
  • Smartphones to outsell PCs - better security needed
    With sales of smartphones continuing to rise - to the point where more smartphones are now expected to be sold this year than conventional PCs - hackers are turning their attentions away from Windows-driven PCs and over to the iPhones, Androids and Win7 handsets in our pockets.
  • Android search engine manipulation trojan dissected
    A rash of Google Android malware has appeared in recent weeks, causing one security researcher to dissect how one nasty piece of code, Android.Adrd - a search engine manipulation trojan - functions, and compare it to another piece of malware, Android.Geinimi.
  • Mobile World Congress: F-Secure introduces Android and Symbian protection
    F-Secure has released version 7 of its Protection Service for Mobile (PSM 7) which extends the smartphone security software-as-a-service (SaaS) platform to support Google Android and Symbian handsets.
  • Android 'sensory malware' steals financial data on the fly
    Researchers at US and Hong Kong universities have developed a new type of malware for the Google Android platform that sits in the background, evaluating the voice and internet data flowing through the smartphone and, when it senses something valuable to cybercriminals, it bursts into action and relays the data to electronic crooks.

Top 5 Stories

News

"Android is terrifying" says ESET's David Harley

01 March 2011

David Harley, ESET's senior researcher fellow, is hosting a presentation on the mysteries of the Stuxnet malware on day one of the Infosecurity Europe show next month, and Infosecurity got a chance to talk to him about the latest trends in malware.

Harley, who was previously a threat assessment management centre manager with the NHS, says that his observations of the IT security industry over the last two decades suggest that vendors are "re-inventing the wheel" when it comes to countering security threats.

"It's a cyclical business," he told Infosecurity, adding that shows like Infosecurity Europe and RSA allow vendors to show off their latest defence methodologies, but not all the solutions are that new in terms of the way they operate.

A classic case of this, he says, is application whitelisting, which tends to be wheeled out every few years as the latest method of defending against malware and hacker attacks.

This is despite, he adds, that the problem in today's IT security world is of tracking applications as they execute, and controlling them.

The biggest threat at the moment, says Harley, is the flexibility that a modern 'soft' environment, such as a virtual platform, or a software-driven box, offers hackers and other miscreants.

"And then there is the growing problem of smartphone apps to contend with. They are difficult to control," he said, adding that Google Android is a case in point.

Google Android, he explained, is an open source platform, meaning that almost anyone can create and modify apps for the smartphone, which can then be offered for download on the internet, as well as on the Android Marketplace.

This, he says, differs markedly to the Apple approach of whitelisting apps for use on iPhones, iPads and iPod touches.

"Android is terrifying. Researchers are now saying that there will be 17 billion smartphone apps [not just on Android] downloaded by the end of 2011", he said, adding that it is an almost impossible task to track them.

This article is featured in:
Application Security  •  Malware and Hardware Security  •  Wireless and Mobile Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×