Malware writers are more frequently targeting Android devices than other platforms, according to a security vendor. Not surprisingly, the company offers a solution to the problem.
Android is one of the most popular mobile operating systems in the world. As a result, it's also one of the most popular mobile operating systems to be targeted by malware writers. Malware aimed at Google's Android platform increased sixfold during the quarter that ended in September, according to a report released Monday by Trend Micro.
A new security report published by Cisco has found that 99% of all mobile malware attacks are targeted at Android devices. On top of that, the report says Android suffered 91% of all Java-based web exploits and 71% of all overall web-based exploits. Ouch.
Mobile malware remains a small and nascent issue, especially when compared to the scale of threats crowding around desktop OSes, but the threat that is out there continues to mostly affect Google’s Android platform.
Mobile malware is rising, and there have been explosions in the world of viruses and Trojans. Virus makers are now targeting mobile platforms- thanks to their growing popularity. If we take the statistics from last 6 months, the chances of Android smart phones to be infected have doubled.
Yes I am put off anitvirus progs running all the time - eats too much ramI was wondering more abt malware - I dont want my bank details sent to Russia or whatever.I did think linux was not worth the attention of malware writers but now with android tablets and phones becoming so widespread maybe it will lead to more attention.
Despite Google tightening Android’s security screw, by introducing an additional layer of security to the Play Store earlier this year to scan for malicious code (and its September acquisition of online virus and malware scanner VirusTotal), Android’s malware problem has surged in the third quarter.
Within 12 to 24 months over 1 in 20 (5.6%) of all Android phones and iPads/iPhones could become infected with mobile malware if fraudsters start to integrate zero-day vulnerabilities into leading exploit kits, claims security firm Trusteer.