Mobile Device Vulnerabilities
Trojan Horse
- Spread by program to trick users into downloading and installing malware
- It is designed to appear or disguised as a legitimate software.
click to edit
- Install trusted internet security - install easy-to-use cybersecurity software
- Keep up to date - keep your system’s software up-to-date.
- Be alert to email attachments - be cautious about attachments in any unexpected emails.
- Be alert to email links – never cliick the link if something doesn’t seem quite right.
Botnets
click to edit
- The software programs created to automatically perform specific operations.
- A set of compromised devices can be controlled and coordinated remotely
- Spread by sending copy of it from compromised devices to other devices via text messages and e-mail messages.
Cosequence
- Take advantage of unpatched exploits
- Provide hackers with root permissions over(make phone calls and access photos
Preventation and Solution
- Websites can guard against bots with CAPTCHA tests verify users as human.
- Only download apps from trusted and reputable app stores
- If you spot unusual behaviour on your phone like your battery suddenly running low, sudden disconnections from networks or services.
Worm
- A subtype of virus which is can self-replicate without a host program and active on an infected system.
- Spreads Independently ; directives from the malware authors and also over mobile networks by exploiting OS vulnerabilities
Cause harm to their host networks by;
- Consuming bandwidth
- Overloading web servers
- Slowing or halting other tasks
Preventation and Solution
- Use anti-virus(anti-worm) to remove the worm.
- Avoid public or unsecured Wi-Fi channels which can act as a vector through which worms can travel.
- Never download files from unknown sources
Rootkit
- A program or a collection of software tools which give a threat actor remote access and control over a computer or other system without being detected by users or security programs and also does Silent operation difficult to prevention, detection and removal
- Spread by hiding in software(may appear to be legitimate and trick users giving the rootkit permission to be installed
After installed in victim:
- Modify system configurations -
- Install concealed malware
- Access or steal information
Solution & Prevention
- Latest anti-malware programs can detect and remove rootkits
hiding in a system.
- Regularly patching vulnerabilities in software, applications and OS
- Performing static analysis scans.
click to edit
click to edit
click to edit
click to edit
- Create a backdoor of your computer.
- Gives malicious users access to your system.
- Allowing confidential or personal information to be compromised.
- Steal data, install more malware, modify files, monitor user activity,
click to edit