Android malware has spiked again, rising six-fold in the third quarter of 2012, according to research from security heavyweight Trend Micro.
From 30,000 malicious and potentially dangerous Android apps in June, Trend claimed there were 175,000 by the end of September. Fake versions of legitimate apps were the most prevalent of all forms of Android malware.
“This quarter, data stealers like Solar Charge and premium service abusers like Live Wallpapers in China or fake versions of best-selling apps that spread in Russia further raised concerns about the open nature of the Android ecosystem,” Trend’s report read.
Android is generally considered to be the most targeted and most insecure mobile operating system, largely because of its open nature and its massive popularity.
It has been beset by malicious apps, as well as insecure software, as shown by a report out this week highlighting SSL weaknesses in over 1,000 applications.
The topic of how best to secure Android devices has become a major point of discussion in the security community. Some, like Cisco, do not foresee a bright future for mobile anti-virus. Instead, they believe network-based products, such as those services that containerise applications to separate corporate and personal data, are the future.
But Trend still believes AV has a place in the mobile world. Rik Ferguson, director of security research and communication for EMEA at Trend, told TechWeekEurope he thought AV was just part of wider endpoint solutions.
“Secure mobile device management should allow device and profile provisioning, management of functionality, activation and suppression of features based on factors such as time of day or location for example (automatically disable device cameras when in the data centre anyone?) ,” Ferguson said,
“It’s about pushing out obligatory apps, locking down access to App Store environments, detecting whether a device has been jailbroken, it’s about encryption, power management and yes, it’s about anti-malware.
“Many of these functions simply cannot be achieved by network based technologies as they depend on direct interaction with the device in question and not only that a smartphone or other mobile device is designed to store and process (corporate) information locally and can operate on the corporate network or on a mobile provider’s network.
“Endpoint-based security technology will allow you to continuously monitor and enforce policy, wherever the device happens to be located.”
How well do you know Internet security? Try our quiz and find out!
CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation
Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…
Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…