As Web access expands, experts say new malware threats concern
It seems nobody is safe from malware attacks these days –even the White House is taking notice. Last week, a Department of Homeland Security official acknowledged the threat of pre-existing malware on imported electronic and computer devices sold within the U.S. With the availability of malware entry points expanding — including ubiquitous IT such as emails, social media, smartphones and tablet computers — the threat is not going anywhere anytime soon.
Eighty-seven percent of 2,277 surveyed smartphone owners used their device to access the Web or email at least once a day, according to a recent report issued by Pew Research Center. Of those smartphone owners, 25% said that they mostly go online using their phone, rather than with a computer. Also last week, Trusteer CEO Mickey Boodaei told eWeek Europe that as smartphones grow in popularity, hackers are increasingly researching Apple iOS and Android for vulnerabilities. One in 20 Android mobile phones and iPhones will be infected by financial malware and Trojans within the next 12 months, he added.
Budget constraints, unawareness of the severity of new malware threats and a reactive attitude to malware contribute to the problem, according to reps from M86 Security in their report on new malware threats.
Despite a high level of concern expressed about the security of mobile devices, 14% of 382 companies surveyed in M86’s report have no solutions in place to protect users from Web-based threats. Researchers found that 78% of the organizations surveyed had experienced at least one malware attack during the preceding 12 months.
In addition, 49% of survey respondents acknowledged that although security breaches occur, they accept this as part of the cost of doing business. This complacent attitude toward malware could result in additional costs, bad press and lost revenue opportunities for companies involved.
The M86 report recommended that organizations consider addressing malware prevention, detection and remediation in two ways: