Share On

Loading...
PROCESSING. PLEASE WAIT...

"10th Anniversary of Mobile Malware"

The World's First Mobile Malware Celebrates Its 10th Birthday

White Paper: Fortinet

From Cabir to FakeDefend, the last decade has seen the number of mobile malware explode. In 2013, Fortinet’s FortiGuard Labs has seen more than 1,300 new malicious applications per day and is currently tracking more than 300 Android malware families and more than 400,000 malicious Android applications.

Besides the sheer growth in numbers, another important trend to note is that mobile malware has followed the same evolution as PC malware, but at a much faster pace. The widespread adoption of smartphones--and the fact that they can easily access a payment system (premium rate phone numbers)--makes them easy targets that can quickly generate money once infected. Furthermore, they have capabilities such as geo-location, microphones, embedded GPS and cameras, all of which enable a particularly intrusive level
of spying on their owners. Like PC malware, mobile malware quickly evolved into an effective and efficient way of generating a cash stream, while supporting a wide range of business models.

In the following chronology, FortiGuard Labs looks at the most significant mobile malware over the last 10 years and explains their role in the evolution of threats.

The World's First Mobile Malware Celebrates Its 10th Birthday
Login With

Related White Papers

Student ID Verification: What Institutions Need To Know

By: Biometric Signature ID

Student Identification and verification is defined as the verification of identity is in person or remote (meaning from a computer or portable device) which is usually accomplished by the use of biometric credentials. This informative whitepaper brings you: What institutions need to know about the online student identification and verification Lack of compliance for student identification in present day environment New regulations on student identity verification Differences between academic integrity, student identity verification and financial aid fraud Meeting compliance using best practices for student identification and verification Download this whitepaper to learn more about the student identity and verification methods which reduces the risk by providing the industry’s most complete solution for student ID authentication.

The Evolution to Local Content Delivery

By: PeerApp

Local content delivery is advancing to go beyond content caching to include other capabilities that optimizes network for quality and cost. Local content delivery offers an open CDN-like layer that sits within and augments next generation broadband networks, resolving the performance and scale bottlenecks seen in today’s global content delivery platform. Read this “The Evolution to Local Content Delivery” whitepaper that will give you everything you need to get started with the local content delivery solutions that offers an open platform augmenting broadband networks to accelerate Internet content delivery. What this whitepaper covers? Local Content Delivery: Benefits the Entire Value Chain Local Content Delivery: A Platform that Supports Market Evolution Local Content Delivery: Basis for monetization of OTT traffic

What is

What is Malware ?

Malware is an abbreviation for ‘malicious software.” It is used as an umbrella term to refer to worm, spyware, rootkit, trojan, virus and other threats to a computer system. These are basically software designed to damage a computer system(s) and/ or steal data. Yisrael Radai in the year 1990 coined the term malware, which was earlier referred to as virus. Malware are infamous for breaking into computer systems, exhibit unwanted advertisements, and gather confidential information.

What is cyber security ?

Cyber security is the body of technologies and process which practices protection of network, computers, data and programs from unauthorized access, cyber threats, attacks or damages. It deals with controlling physical access to hardware alongside protecting harm coming via network access and code injection. The sole purpose of cyber security is to defend the integrity of computing assets belonging to or connecting to an organization’s network.

What is Mobile Business Intelligence ?

Mobile Business Intelligence is a system that extends desktop business intelligence applications so they are usable on mobile platforms. It comprises both technical and organizational elements that offer real-time information to enable effective decision making and management support for enhancing the organization’s overall performance.

follow on linkedin follow on twitter follow on facebook 2018 All Rights Reserved | by: www.ciowhitepapersreview.com