Oct 13, 2019 | Updated: 10:42 AM EDT

CyberSecurity Threats In Devices

Jan 13, 2014 12:38 PM EST

Close

Google’s Chrome Browser is highly prone to top malware threats. According to the U.S. Cert Gov report, As new vulnerabilities are discovered, the cybersecurity community constantly endeavors to stay ahead of malware developers. The reports states this is an arms race between software developers trying to design systems and applications that are not vulnerable to malware infection and the malicious developers trying to exploit said systems.

CIO

Bug-free applications continue to elude developers, despite efforts to promote secure coding and design practices. Software developers are left to attempt to identify and patch vulnerabilities in deployed software before someone can engineer malware to exploit those vulnerabilities.

Phishing may also affect the Android OS. The U.S. Cert Gov report also indicates that phishing attacks remain a consistent threat to U .S . Internet users . Data from industry partners shows 216,938 unique phishing attacks in 2012, hosted on 153,952 unique domain names . However, not all of these domain names were maliciously registered; many are simply compromised . This determination is generally made based on the past history of the domain; hacked domains have significant previous benign activity . In fact, based on the data provided, only 13,545 of the domains in 2012 seem to have been maliciously registered for the purposes of phishing

Analysis of compiled data indicates that 7 .8 percent of consumer-grade users experienced a malicious software (malware) infection; 20 percent of infections were caused when the user clicked and installed the malicious software. In 2012, 7 .8 percent of consumer users experienced a malware infection, whereas enterprise users reported a 0.7 percent infection rate during the same period:

  • 1 net new system per 1,000 was compromised per month.

  • Only 1 in 5 detection alerts were confirmed infections.

  • 20 percent of all infections were user-introduced (e .g ., the user was tricked to click and install).

  • Approximately 70 percent of the time, known malware installed another file that neither was known.

Securing smartphones is a priority in Android and mobile computer security. With apps that can control and have data management, a new generation of smart phones is coming out every year rather than every 3 years as is the general rule of technology that may increase risk. From 3G to 4G, from single core processors to dual core processors.

Turn your wireless off, including Bluetooth, WiFi, GPS, and even 3G or 4G data connections, when not in use. This also increases your security and battery life. Some third-party software can access your smartphone’s location information, along with other personal data in your phone, so it is smart to download software from a trusted application. Please be careful if you opt to download from an open app store. In addition, some public WiFi connections are unsecured, so hackers can easily read the unencrypted information transferred over that network.

Real Time Analytics