Security risks rise as smartphones become smarter

As mobile operating system standardization increases, smartphone security threats become a more serious issue.

As wireless devices become more numerous within businesses, their convenience will be counterbalanced by an increasing potential for security problems, according to a Gartner analyst.

New trends in the wireless industry are making it easier for hacking attacks, said John Girard, a Gartner vice president, who spoke at the IT Security Summit in London on Monday.

A few years ago, there was not a lot of standardization across wireless devices. Differing operating systems, differing implementations of mobile Java and even varying configurations among devices with the same operating system made it hard to write malicious code that ran on a wide array of devices, Girard said.

But that's changing as the quality control gets better on widely-used platforms such as Microsoft's Windows Mobile and the Symbian operating system, he said. That standardization makes it easier for attackers to write code that will run on many devices.

"The more your phone gets like a PC, the more it can host malicious code," Girard said. "People are getting used to sending out executable code."

Many of the attacks that have been traditionally plaguing desktop machines, such as phishing, will increasingly move to the mobile platform, Girard said. Also, users may be more tolerant of glitches on their mobile phones, which may be clues that a device has been infected or hacked.

That's problematic when enterprises begin installing business applications on mobile phones and carry data that is potentially valuable to attackers, Girard said.

"We're very quickly moving to the point where people really can do business on smartphones," Girard said.

Gartner is predicting that wireless ID theft and phishing attempts targeting mobile devices will become more and more prevalent throughout next year, Girard said.

Companies need to be sure before buying a fleet of mobile devices that those devices meet a minimum security specification. The security specification can be formulated by figuring out what kind of data the device will handle and what regulations a company is bound by under data protection law, Girard said.

If the hardware and software is secure when the device arrives, it makes it a lot easier to manage than trying to fix a device after it's in the field, Girard said.

Girard laid out a few key security points: Data on devices should be encrypted, proper identity and access controls should be implemented and intrusion prevention systems should used to ensure that rogue devices don't access sensitive information, he said.

Tags mobilitysmartphoneswireless

Recommended

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?