{"id":77068,"date":"2015-05-26T17:22:26","date_gmt":"2015-05-26T21:22:26","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-08T17:20:07","modified_gmt":"2021-08-08T21:20:07","slug":"mobile-malware-fud","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/mobile-malware-fud\/","title":{"rendered":"Mobile Malware FUD?"},"content":{"rendered":"<p><a href=\"https:\/\/www.digitalbond.com\/blog\/tag\/fud-and-hype\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-106012 size-thumbnail\" title=\"Mobile Malware FUD?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fud.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Mobile Malware FUD?\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fud.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fud.jpg?w=150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Just last week, I <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/what-triggers-data-breaches\/\" target=\"_blank\" rel=\"noopener noreferrer\">wondered out loud<\/a> from my <em><a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a><\/em> if all the <strong>hype around mobile malware<\/strong> was real or just more <strong>FUD<\/strong>. Looks like I am not alone, <em><a href=\"http:\/\/tech.co\/\" target=\"_blank\" rel=\"noopener noreferrer\">TechCo<\/a><\/em> recently asked a similar question, \u201c<a href=\"http:\/\/tech.co\/byod-mobile-security-2015-05\" target=\"_blank\" rel=\"noopener noreferrer\">Are We Overstating the Threats from Mobile Devices?<\/a>\u201d<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106014 size-thumbnail\" title=\"mobile threats\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2.jpg?resize=75%2C75&#038;ssl=1\" alt=\"mobile threats\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/>The author cites several recent reports that back up the claim that the actual <strong>mobile threats<\/strong> that mobile devices introduce into the <strong>enterprise<\/strong> are overstated. The data indicates that the mobile malware threat is statistically small and has even decreased since 2012.<\/p>\n<p>\u2022 A <strong><a href=\"https:\/\/www.mcafee.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee<\/a><\/strong> <a href=\"https:\/\/web.archive.org\/web\/20151204022600\/http:\/\/www.mcafee.com\/sg\/resources\/reports\/rp-quarterly-threat-q4-2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> shows out of all the malware now out there, only 1.9% of it is mobile malware. The author equates the mobile threat to 4\u00a0million \/ 195 million McAfee knows about.<br \/>\n\u2022 Another <a href=\"http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_data-breach-investigation-report-2015-insider_en_xg.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a>\u00a0(PDF) from\u00a0<strong><a title=\"Verizon\" href=\"http:\/\/www.verizon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon<\/a><\/strong> (<a title=\"NASDAQ : VZ\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-VZ\/\" target=\"_blank\" rel=\"noopener noreferrer\">VZ<\/a>)\u00a0shows even lower numbers, with only 0.03 percent of smartphones being infected with what is called \u201chigher grade <a title=\"Malware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">malicious code<\/a>.\u201d<br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20160428082140\/http:\/\/prepare.ua.edu\/?page_id=261\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106016 size-thumbnail\" title=\"hit by lighting\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lightning.jpg?resize=75%2C68&#038;ssl=1\" alt=\"hit by lighting\" width=\"75\" height=\"68\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lightning.jpg?resize=75%2C68&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lightning.jpg?resize=150%2C136&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lightning.jpg?resize=768%2C694&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lightning.jpg?resize=1024%2C926&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lightning.jpg?w=1327&amp;ssl=1 1327w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lightning.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>\u2022 But some numbers go even lower than that. <strong><a href=\"https:\/\/web.archive.org\/web\/20170529180001\/https:\/\/www.damballa.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Damballa<\/a><\/strong>, a mobile security vendor that monitors roughly half of mobile data traffic, recently released a <a href=\"https:\/\/web.archive.org\/web\/20150726181758\/http:\/\/www.cio.com\/article\/2912628\/mobile-security\/lightning-strike-more-likely-than-mobile-malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> that claims you have a better chance of getting <strong>hit by lightning<\/strong> than by mobile malware.\u00a0Dramballa found only 9,688 smartphones out of more than 150 million showed signs of malware infection. If you do the math, that comes out to an infection rate of 0.0064 percent.<\/p>\n<p>Even more interesting is that despite the increase in mobile devices, Damballa found the <strong>infection rate had declined<\/strong> by half compared to 2012.<\/p>\n<p><a href=\"http:\/\/dismagazine.com\/distaste\/46776\/dis-trends-ss-2013\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106018 size-thumbnail\" title=\"Walled garden\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fishbowl.jpg?resize=68%2C75&#038;ssl=1\" alt=\"Walled garden\" width=\"68\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fishbowl.jpg?resize=68%2C75&amp;ssl=1 68w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fishbowl.jpg?resize=136%2C150&amp;ssl=1 136w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fishbowl.jpg?resize=768%2C846&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fishbowl.jpg?resize=929%2C1024&amp;ssl=1 929w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fishbowl.jpg?w=1452&amp;ssl=1 1452w\" sizes=\"auto, (max-width: 68px) 100vw, 68px\" \/><\/a>These reports may show mobile threats aren\u2019t as big of a problem as previously thought, but the author asks, why the numbers are so low at all. After all, cybercriminals like to target new platforms and exploit security weaknesses. Why do they seem to be avoiding mobile devices?<\/p>\n<p>The truth of the matter is that mobile users tend to get their apps from high-quality app stores. The <strong>stores from\u00a0<a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> <\/strong>(<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>)<strong> and\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><\/strong> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>)\u00a0work to filter out suspicious apps. If malware is found in apps after they\u2019ve already been on the market for a while, app stores can also execute a kill switch, which takes the app off the store and the devices where they were downloaded. This <strong>limits malware\u2019s ability to spread<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.makeuseof.com\/tag\/5-tools-permanently-delete-sensitive-data-hard-drive-windows\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106020 size-thumbnail\" title=\"remotely wipe devices\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata.png?resize=75%2C75&#038;ssl=1\" alt=\"remotely wipe devices\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The article concludes\u00a0that companies that adopt <a title=\"Bring your own device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">BYOD<\/a> should just ignore BYOD security; they just don\u2019t have to go all-out as many businesses have done. Most mobile security experts say a <strong>mobile device management<\/strong> system remains a good investment to make sure mobile devices are handled appropriately. <a title=\"Mobile device management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device_management\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">MDM<\/a> systems also allow an organization to<strong> remotely wipe devices<\/strong>, thus keeping sensitive data safe in the event a device is lost or stolen. But malware really isn\u2019t a factor in those cases, so the overall message from these recent reports is that getting worked up over mobile threats is not necessary. A company can still gain all the benefits of BYOD without having to worry incessantly over what they\u2019re doing to protect every device that connects to their network.<\/p>\n<p>r<strong>b-<\/strong><\/p>\n<p>What do you think?<\/p>\n<div id=\"polls-23\" class=\"wp-polls\">\n\t<form id=\"polls_form_23\" class=\"wp-polls-form\" action=\"\/index.php\" method=\"post\">\n\t\t<p style=\"display: none;\"><input type=\"hidden\" id=\"poll_23_nonce\" name=\"wp-polls-nonce\" value=\"40f308dbee\" \/><\/p>\n\t\t<p style=\"display: none;\"><input type=\"hidden\" name=\"poll_id\" value=\"23\" \/><\/p>\n\t\t<p style=\"text-align: left;\"><strong>Is mobile malware over-hyped FUD?<\/strong><\/p><div id=\"polls-23-ans\" class=\"wp-polls-ans\"><ul class=\"wp-polls-ul\">\n\t\t<li><input type=\"radio\" id=\"poll-answer-59\" name=\"poll_23\" value=\"59\" \/> <label for=\"poll-answer-59\">Yes - FUD is also known as marketing<\/label><\/li>\n\t\t<li><input type=\"radio\" id=\"poll-answer-60\" name=\"poll_23\" value=\"60\" \/> <label for=\"poll-answer-60\">No - I'm really scared man<\/label><\/li>\n\t\t<\/ul><p style=\"text-align: center;\"><input type=\"button\" name=\"vote\" value=\"   Vote   \" class=\"Buttons\" onclick=\"poll_vote(23);\" onkeypress=\"poll_result(23);\" \/><\/p><p style=\"text-align: center;\"><a href=\"#ViewPollResults\" onclick=\"poll_result(23); return false;\" onkeypress=\"poll_result(23); return false;\" title=\"View Results Of This Poll\">View Results<\/a><\/p><\/div>\n\t<\/form>\n<\/div>\n<div id=\"polls-23-loading\" class=\"wp-polls-loading\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/plugins\/wp-polls\/images\/loading.gif?resize=16%2C16&#038;ssl=1\" width=\"16\" height=\"16\" alt=\"Loading ...\" title=\"Loading ...\" class=\"wp-polls-image\" \/>&nbsp;Loading ...<\/div>\n\n<p>&nbsp;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>Your BYOD implementation checklist (powermore.dell.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent reports suggest mobile malware threats are over-hyped Are anti-virus vendors guilty of marketing FUD<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,420,202,565,101,1242,2444,2443,536,92,1135,944,296,304,23,404,1472,431,813,4,1961,89,734],"class_list":["post-77068","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-aapl","tag-android","tag-anti-virus","tag-apple","tag-byod","tag-damballa","tag-fud","tag-goog","tag-google","tag-ios","tag-iot","tag-ipad","tag-iphone","tag-malware","tag-mcafee","tag-mdm","tag-mobile","tag-mobile-device","tag-security","tag-tablet","tag-verizon","tag-vz"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77068"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77068\/revisions"}],"predecessor-version":[{"id":132652,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77068\/revisions\/132652"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}