Apps going viral: When your smartphone gets hacked

How secure is banking on your iPhone? How sure are you that those app developers have plugged those security holes?

How secure is banking on your iPhone? How sure are you that those app developers have plugged those security holes? So far, there isn’t much malicious code out there targeted at smartphones, but that soon may change as smartphone sales surpass those of laptop and desktop machines.

A notable security hole was discovered in June of 2009 in the iPhone app for Citigroup’s banking customers. Before hackers could exploit the vulnerability -- which would have allowed hackers to download banking details for almost 120,000 customers -- Citi pushed out changes to the app, but that doesn’t mean that more banking apps exist with flaws.

With a huge and growing population using phones to do mobile banking, it’d only make sense for tech-savvy thieves to go after bank information on smartphones. While the number of bits of nasty code meant for Android, iOS, and Blackberry phones numbers less than 100 for all of 2010 according to Internet security firm F-Secure, this could change in the coming years if not months. As Intel purchases McAfee and other companies gobble up startup security software firms, Infonetics Research predicts that the market for mobile phone security software will increase to over a billion US dollars in the next three years.

Will attacks focus more on iPhone or Android users? Though sales of both phones are increasing, Google’s lack of checking apps on its Android Market could mean more programs written by malicious developers. Up to five per cent of Android apps can send SMS or dial numbers without the phone owner’s permission, according to SMobile Systems.

Do you have security or anti-virus software installed on your smartphone? Not many people do, but as security threats to smartphones increase, antivirus software, provided by either a big hitter like McAfee or smaller security company, may become commonplace.

Join the CSO newsletter!

Error: Please check your email address.

Tags consumer electronicssecuritysmartphonesPhones

More about F-SecureGoogleInfonetics ResearchIntelMcAfee Australia

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Alessondra Springmann

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts