• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » News » Mobile Device Malware Attack Vectors

Mobile Device Malware Attack Vectors

2018-10-01 by Max

Smartphones represent a massive, almost impossible to remove, security flaw in any cyber defence. Essentially everyone has one, and they take it with them everywhere. Some people have more than one phone, with specialized devices for their work or data storage. These devices travel thousands of miles and find themselves in different people’s hands all the time. Smartphones have become so integral to the modern business landscape that it’s hard to imagine a world without them, and the convenience they bring it seen as outweighing the risks. There has been a rise in malware attacks against cell phones and other mobile devices (such as cell-enabled tables) in recent years as their vulnerable nature is exploited.

Malware attacks against mobile devices fall into four broad categories. The first would be pre-installed malware that is found on cheap alternative phones that are not normally carried by a major service provider. These phones come with pre-installed bloatware and malware that renders any attempts at privacy meaningless. In most cases it’s impossible to remove the malware, so short of buying a new phone there’s no way to solve the problem.

The second kind of mobile attack is fake apps that have made their way onto the legitimate app store for the OS. These apps are usually found and removed quickly, but sometimes they persist and allow the creators access to private files. Be sure to check the developer of any app that you download, and if the app is very new it should be avoided on a secure device. The Third method is related to the classic banner ad attack traditionally seen on full-sized computers when a user goes to a website a large ad is put on their screen. Touching the ad starts the download for the malware, and there is no way to close the pop-up. The reaction to click the pop-up to close it does all the work without any complicated delivery system.

Finally, and certainly the most exciting is when malware is installed directly on to a device through physical means. This doesn’t necessarily require a flash drive or memory card to be installed, even charging a device can lead to it being compromised. The virus that infected the US wireless network is believed to have come from an infected USB port in Russia that infected a phone. This infected device brought the virus back, with the owner none the wiser because they’d only charged their phone. Remember, a USB port’s primary purpose is transferring data.

Filed Under: News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Get 90% Off Ivacy VPN! (ad)

IVacy VPN

WHAT TO SHOP NOW

Shop

Safeguard Your Money with a VPN

Beat the Stock Market! - Get Rule Breakers!

Malwarebytes Anti-Virus is On Sale!

Shop Kaspersky Anti-Virus

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Airplane Manufacturer Hit by Data Breach

Google Impersonation Scam Steals Passwords

IRS Warns of Tax ID Number Scam

Senior Associate, Information Security Operations

SolarWinds May Shape Cyber Policy: Saturday Sitrep

Categories

Cyber Security News

Airplane Manufacturer Hit by Data Breach

… [Read More...] about Airplane Manufacturer Hit by Data Breach

Google Impersonation Scam Steals Passwords

… [Read More...] about Google Impersonation Scam Steals Passwords

Netherlands Police Post Warnings to Would-be Hackers

… [Read More...] about Netherlands Police Post Warnings to Would-be Hackers

Kia Motors Hit by Ransomware Attack

… [Read More...] about Kia Motors Hit by Ransomware Attack

More Cyber Security News

Tags

amazon Android app Apple bitcoin China chrome CISA credit card Cyber Attack DHS Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware Romance Scam Russia smartphone tax scam TikTok tutorial VPN WhatsApp WiFi Windows

Government

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

Texas DOT Hit by Ransomware Attack

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2021 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version