For example, the Hamweq.A worm, which spreads via removable USB drives, used smartphones as a carrier, and memory cards supplied by Vodafone Spain for certain Android-based smartphone models were infected with the Mariposa bot client. The malware was not able to harm the Android smartphone itself, but attempted to contact a command-and-control server when the phone was connected to a Windows PC. Viruses can also spread in the reverse direction: When someone plugs a smartphone into a computer that has been infected, the virus can be transferred onto the smartphone, which can then act as the carrier to infect any other computer that the phone connects to.
One reason malware uses USB for distribution is that the malicious code can take advantage of the autorun feature in Windows. By modifying the autorun.inf file with specific commands, cybercrooks can enable malware stored on the USB drive to run automatically when the device connects to a computer, immediately infecting the computer almost transparently to the user. In 2009, the Conficker worm exploited a bug that prevented users from disabling AutoRun to automatically infect PCs when USB drives were plugged in. (Microsoft has since patched this and changed the AutoRun's behavior in Windows 7.)
Everyone needs to appreciate that their phone is a vector for malware distribution and exercise many of the same security precautions that they would with a laptop. Only download and install applications from reliable sources such as the Apple iTunes store, Google Android Market or Nokia OVI Store, and be wary of opening files, emails, SMS messages, and IMs if they're from an unknown source. You should disable Wi-Fi access by default and only connect to known Wi-Fi hotspots. Bluetooth should also be disabled until you want to share something; the Cabir Symbian virus attempts to spread via Bluetooth. Finally, think about installing a mobile-based antivirus software package: McAfee Inc.'s VirusScan Mobile for Android, for instance, is free to its existing desktop antivirus customers.
Dig Deeper on Enterprise mobile security
Related Q&A from Michael Cobb
The TLS protocol has fallen on hard times, but expert Michael Cobb explains how client puzzles can help fix some of the problems.continue reading
Microsoft's Wi-Fi Sense for Windows 10 can share encrypted passwords for Wi-Fi networks, but is it safe? Expert Michael Cobb has the answer.continue reading
Several security vendors and providers have been hacked over the last year. Expert Michael Cobb explains how enterprises should prepare for a vendor ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.