• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Mobile Device Malware Attack Vectors

Mobile Device Malware Attack Vectors

2018-10-01 by Max

Smartphones represent a massive, almost impossible to remove, security flaw in any cyber defence. Essentially everyone has one, and they take it with them everywhere. Some people have more than one phone, with specialized devices for their work or data storage. These devices travel thousands of miles and find themselves in different people’s hands all the time. Smartphones have become so integral to the modern business landscape that it’s hard to imagine a world without them, and the convenience they bring it seen as outweighing the risks. There has been a rise in malware attacks against cell phones and other mobile devices (such as cell-enabled tables) in recent years as their vulnerable nature is exploited.

Malware attacks against mobile devices fall into four broad categories. The first would be pre-installed malware that is found on cheap alternative phones that are not normally carried by a major service provider. These phones come with pre-installed bloatware and malware that renders any attempts at privacy meaningless. In most cases it’s impossible to remove the malware, so short of buying a new phone there’s no way to solve the problem.

The second kind of mobile attack is fake apps that have made their way onto the legitimate app store for the OS. These apps are usually found and removed quickly, but sometimes they persist and allow the creators access to private files. Be sure to check the developer of any app that you download, and if the app is very new it should be avoided on a secure device. The Third method is related to the classic banner ad attack traditionally seen on full-sized computers when a user goes to a website a large ad is put on their screen. Touching the ad starts the download for the malware, and there is no way to close the pop-up. The reaction to click the pop-up to close it does all the work without any complicated delivery system.

Finally, and certainly the most exciting is when malware is installed directly on to a device through physical means. This doesn’t necessarily require a flash drive or memory card to be installed, even charging a device can lead to it being compromised. The virus that infected the US wireless network is believed to have come from an infected USB port in Russia that infected a phone. This infected device brought the virus back, with the owner none the wiser because they’d only charged their phone. Remember, a USB port’s primary purpose is transferring data.

Filed Under: News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version