the number of malware on mobile phones is still very small. To date, less than a few viruses, worms, and Trojans have been discovered that specialize in mobile operating systems . Most cause relatively minor damage, such as file loss, hardware reset, or additional charges.
Unfortunately, the threshold for long-term restrictions on malicious attacks is fading. First, the number of mobile device users is growing fast. Second, the market for new, popular commercial consumer-grade devices, such as Apple's iPhone and HTC 's Android G1, could eventually develop into a lucrative market, attracting a large number of malware developers.
In addition, modern smartphones are no longer subject to narrow wireless coverage, single operating systems or gigabit storage capacity. Near ubiquitous 3G and Wi-Fi simplifies the wireless transmission of malware, and the storage capacity of a few G bytes makes more sensitive data stolen. As users increasingly use their mobile devices to e-mail and surf these applications (which is also the medium of traditional malware), this makes the spread of malware more feasible. Short Message services (SMS) and multimedia information Services (MMS) are also a new way to spread malware.
the last hurdle could be a single mobile development environment that is easy for attackers to compromise. In the past, a variety of different specifications, closed development environments often make malicious software impossible. The system has become the most frequently attacked mobile platform because of its friendly development environment. Today, an open system development platform is being established. malware that exists in MacOS and Win32 environments can also invade the mobile development platform of the IPhone and Windows.
Fortunately, as mobile devices become more powerful, the security model of mobile operating systems and third-party security programs are also evolving. Mobile smartphones and PDAs managers can install these off-the-shelf defense software to detect and block the installation and execution of mobile malware.
First, you can verify the digital signature of all mobile device executables and installation files.
Next, use the access control of the mobile operating system to prevent malicious software from tampering with files and invoking sensitive functionality. For example, the Rights Management policy of Symbian 9 can restrict programs from accessing the system and / or users ' files and network interfaces, and data locking can divide data into private folders and be invisible to untrusted programs. Configuring these access control policies helps prevent spyware from stealing data and prevents Trojans from leaving the backdoor.
Finally, unlike laptops, mobile handheld devices do not have a firewall installed at the factory , Antivirus software or junk mail filters. It may be considered to fill these vacancies by installing a system-resident mobile Security program device. These programs are adept at handling threats from mobile devices, such as detecting Trojan horses in mobile operating systems, filtering text messages, and preventing malware from invading enterprise servers.
Increased security threats to smartphones and handheld computers