Eset Readies Mobile Security Software for Some Smartphone Operating Systems

track your movements. Malware surreptitiously installed on your smartphone can actually transmit your calls so that a third-party listener can eavesdrop on your conversations. At a security conference in May, Zajac says there was a proof-of-concept demonstration of a hacker rootkit installation on a smartphone, and the rootkit could be triggered by a text message so that the activation of the program would be invisible to the user.

In thinking about it, though, I realized I’m always reading about Internet-based attacks on financial computer networks, online shopping networks, and other commercial IT networks—but when do we hear about hacker attacks on mobile phones? Or enslaved smartphones taking part in botnet attacks?

Such attacks are indeed rare—but only for the time being, Zajac said, “This is all about making money for cyber criminals and organized crime. If the platform is prevalent and has sufficient computing power, it will be attacked for purposes of cyber crime.”

Cyber criminals have not focused their resources on mobile technologies just yet, Zajac said, in part because there are many different mobile operating systems—Symbian, Research in Motion, iPhone OS, Windows Phone, Linux, and Android. Smartphones and other mobile devices also don’t store much data of value to cyber criminals. That’s because smartphones typically don’t store databases, and instead accessing information from databases in the cloud, according to Zajac. Still, smartphones are increasingly carrying around more data, and more and more apps have built-in databases. So it won’t be too long before you can put a laptop’s worth of information onto a phone.

But he predicts mobile systems will come under attack as the wireless industry develops technology that enables people to make retail purchases and conduct other business transactions using smartcards or other near-field communications technology embedded in their smartphones.

“The information flowing in and out of your smartphone can be compromised,” Zajac says, “so you’re at very high risk.”

In short, mobile platforms are not a target yet. But they will be, and that’s the challenge Eset and the wireless industry is moving to address.

Author: Bruce V. Bigelow

In Memoriam: Our dear friend Bruce V. Bigelow passed away on June 29, 2018. He was the editor of Xconomy San Diego from 2008 to 2018. Read more about his life and work here. Bruce Bigelow joined Xconomy from the business desk of the San Diego Union-Tribune. He was a member of the team of reporters who were awarded the 2006 Pulitzer Prize in National Reporting for uncovering bribes paid to San Diego Republican Rep. Randy “Duke” Cunningham in exchange for special legislation earmarks. He also shared a 2006 award for enterprise reporting from the Society of Business Editors and Writers for “In Harm’s Way,” an article about the extraordinary casualty rate among employees working in Iraq for San Diego’s Titan Corp. He has written extensively about the 2002 corporate accounting scandal at software goliath Peregrine Systems. He also was a Gerald Loeb Award finalist and National Headline Award winner for “The Toymaker,” a 14-part chronicle of a San Diego start-up company. He takes special satisfaction, though, that the series was included in the library for nonfiction narrative journalism at the Nieman Foundation for Journalism at Harvard University. Bigelow graduated from U.C. Berkeley in 1977 with a degree in English Literature and from the Columbia University Graduate School of Journalism in 1979. Before joining the Union-Tribune in 1990, he worked for the Associated Press in Los Angeles and The Kansas City Times.