For example, the Hamweq.A worm, which spreads via removable USB drives, used smartphones as a carrier, and memory...
cards supplied by Vodafone Spain for certain Android-based smartphone models were infected with the Mariposa bot client. The malware was not able to harm the Android smartphone itself, but attempted to contact a command-and-control server when the phone was connected to a Windows PC. Viruses can also spread in the reverse direction: When someone plugs a smartphone into a computer that has been infected, the virus can be transferred onto the smartphone, which can then act as the carrier to infect any other computer that the phone connects to.
One reason malware uses USB for distribution is that the malicious code can take advantage of the autorun feature in Windows. By modifying the autorun.inf file with specific commands, cybercrooks can enable malware stored on the USB drive to run automatically when the device connects to a computer, immediately infecting the computer almost transparently to the user. In 2009, the Conficker worm exploited a bug that prevented users from disabling AutoRun to automatically infect PCs when USB drives were plugged in. (Microsoft has since patched this and changed the AutoRun's behavior in Windows 7.)
Everyone needs to appreciate that their phone is a vector for malware distribution and exercise many of the same security precautions that they would with a laptop. Only download and install applications from reliable sources such as the Apple iTunes store, Google Android Market or Nokia OVI Store, and be wary of opening files, emails, SMS messages, and IMs if they're from an unknown source. You should disable Wi-Fi access by default and only connect to known Wi-Fi hotspots. Bluetooth should also be disabled until you want to share something; the Cabir Symbian virus attempts to spread via Bluetooth. Finally, think about installing a mobile-based antivirus software package: McAfee Inc.'s VirusScan Mobile for Android, for instance, is free to its existing desktop antivirus customers.
Dig Deeper on Enterprise mobile security
Related Q&A from Michael Cobb
Spyware can steal mundane information, track a user's every move and everything in between. Read up on the types of spyware and how to best fix ... Continue Reading
Explore the differences between symmetric vs. asymmetric encryption algorithms, including common uses and examples of both, as well as their pros and... Continue Reading
Pirated software is still a major concern nowadays. Uncover how to prevent software piracy and protect your organization's intellectual property. Continue Reading