Malware is software which is found
harmful and can damage or disable the system or devices that can interact in the
normal functioning of a system. It can’t damage devices physically, but it can
encrypt or hack data. Android and iOS are operating systems used by mobile
devices. Malware can target both systems. Apple and Google have taken
precautions to avoid this malicious software, but still, it can be harmful to
systems.
Android devices are almost 50% risky
to be infected by malware than Apple devices. Different reasons are behind that
malware attack on mostly google-created platform.
Cyber-crime is commonly aiming the
system at large scale. The major cause of it is, the increasing number of
phones and tablets. The more likely devices increase, the more is a risk.
Phenomena are, there is a big difference between iOS and Android at least not
surely right. Apps are nearly the same offered by both. People have a choice
between Android and iOS, and some selection is competitive between both due to the
same approach. Both platforms borrow a lot of functions from each other.
However, there is still some point where these two operating systems differ
from each other, and this means the choice is still tough to make as there is
still a difference between iOS and Android. Apple’s iOS has the different
function of iTunes, which is only supported by iPhone iPod etc. (M.Sikorsk and Honig) .
The number of devices increases
rapidly threat factor also increased. The priority of business corporate should
be to protect the system. The one reason is also that most transactions take
place by mobile, which becomes a cause of risk.
Security
Measures of Malware Targeting IOS And Android Platform
In case of Android phone, always use
an updated version of Android Operating System as these are designed to protect
from the latest security threats. While Apple’s iOS is required to install as
soon as they released in the market. For security measures, both companies can
introduce automatic updating version to overcome this problem.
Often, users install different apps
which could be infected by malware. Inform the user about the app, which is
harmful to the device so a user should avoid to install it (M.Ligh, Adair and B.).
Sometimes users connect network connection
from the different platform where a wireless connection is being operated by
corporate authority, which could be affected by a malicious virus.
The business organization should
apply “bring your own device” rule to the employees as users could properly
defend their device with great care. If they use their devices, they will
surely follow the instructions written in policies.
Root devices could access Operating
System without any restrictions, which means device allow to install any app,
including malicious app. So this is better for Android and iOS to avoid
introduced root-enabled devices.
With a strong set of password, there
is less risk of hacking. Encrypt the devices to make it incredible.
Device security policies should
install security framework. If the security features do not comply with the
device, it could not access the corporate network.
Apps should install from reliable
resources such as Google Play and Apple Store as policies secure it. If an irrelevant
source is used to, it may cause damage to data or device.
User installs cloud sharing to
download data. Mostly user wants to access data from any device by using cloud
sharing. Provide different alternatives for cloud sharing process.
Android devices should secure with
anti-malware software, which helps to reduce the risk of malware infection. iOS
and BlackBerry already have anti-malware software.
History
of Malware of Malware Targeting IOS And Android Platform
A
glance at malware history shows that the malicious virus has been computing our
date from years. The computer virus is attacking since almost 1949. In the
early years, floppy disks were the cause of widespread malware. The very first
file was viruses in the 1970s name “Creeper Worm”. Creeper accessed through
ARPANET with a message “I’m the creeper, catch me if you can!”
However, the term “virus” wasn’t
common till the 1980s then a program that infects or damage the program was
termed as a virus. In the very beginning, there was a low rate of damage by
malware, but with time, now almost one-third computer of the world is damaged
by malware. The major cause of this is cybercrime, which is increasing day by
day. In the last decade, malware spread rapidly due to the increasing number of
internet and devices use (F.Tchakounté and Dayang) .
Although malware-infected much of
the devices in the last era, today, devices are at risk as hundred of the
devices are a target of malware. The fight with malware is across the globe,
and it could be never to end. Anti-virus industry keenly working to control
this curse but it is impossible to remove it completely, but it could slow down
its process.
In early years, malware damage data
through connection of corporate network but now a days it is being used by
black hat hackers and government to get information about the people’s
financial position, identification number bank’s credit cards etc. in modified
form and with the widespread of malware, this malicious software is being used
for the beneficial purpose.
The way the people use the devices
with different network, the malware is targeting the Android and iOS with new
infection vectors. As malware is increasing, precautions are also adopted to
overcome by both Android and iOS. Mostly malware interacts with devices through
is internet email as you can connect with anyone online. To overcome this
problem, install the new toolbar from an unknown source, open the malicious
file and processed it with anti-malware security application. Don’t install the
application when it is mentioned that it could be accessed or get your personal
information.
Malware attack is always to access
your device by your permission. When you install file from an untrustworthy
source, malware enters in your document or device and get ready to spoil it. So
don’t use any vague or risky app on your device. Another way for malware is
social links through device or mobile phones. A user connects mobile phones with
their social sites and unknowingly clicks an irrelevant link which could allow
the malicious malware to access the files in the user device. To avoid this, we
should take an overview of the link before opening it because it is possible
that by just opening the link, you could get infected. However, if you are not
using an adequate source to banned the malicious infection, you are still on
the risk.
Common
Infection Vectors for Mobile Devices of Malware Targeting IOS And Android
Platform
Currently, people using networks all
over the world; the number of malware infection is increasing. Mobile phones
are using corporate networks, which is the main cause of being infected. These
mobile phones can become a hurdle in the programming of software.
As many malware infection vectors are
growing. Followings are the different vectors involve with mobile phones:
Mobile phones are using
different cloud to download data from the website, which can cause an
invitation to the malware vectors. With the use of outdated software, such as
old browsing or old Operating System, could enhance the risk of drive-by
downloads.
While using a corporate
network connection in mobile phones, often Ad stream lives, which could be
malicious. Simply by viewing this ad can inject malicious malware in the phone.
The mobile phone is in a
vicious circle by a new technique, known as mouse hovering. When hovers used by
the user this may infect the device.
Scamware disguised as
malware protection is a more advanced technology being used to protect mobile
phones. This software works as a cleanup booster, but hackers were able to
inject malware in the product, many users have faced that problem.
Organization concern with mobile phones of Malware Targeting
IOS And Android Platform
As with growing new
technology, mobile phones used corporate networks, which is a tough task to
handle for the IT department. The organization uses mobile device management
(MDM) to secure devices within the enterprise to remove the insufficient
corporate network. Manufacturers of mobile devices are attentively working on
security measures for corporate networks. Strong password and security VPN is
used to secure the connections, so the unauthorized network could not approach
the device. In an organization, many businesses offer benefits connected with networks,
which is more flexible and hurdle in security.
Companies present the
devices in the market with official trademark and anti-malware protection,
which help to work smoothly with corporate networks. Data could be encrypted
from SD card using corporate networks, so at very least precaution, use strong
password and storage devices.
Mostly organizations,
networks based on Wi-Fi networks, which is offered by the malicious software.
These networks demand confirmation through Google are social accounts which are
not usually secured. Another problem is that users put the same passwords for
different apps, which results in security problems. The precaution is not to
use public networks, which requires your personal information to obtain access.
Another issue is the use
of communication channels, such as text writing for mobile phones. Any hacker
can access data through sending a message and after getting a reply via a
specific application. The mobile number helps the hacker top get data just
after a callback. So it is better to confirm the number before making a
callback.
Hackers are well aware of
the use of Google account and iCloud to control mobile device play store. One
can access data with iCloud account through backup along with all apps,
messages, contacts and call logs, etc. Anyone who can hack data one time, he
could permanently track the device and can control some key functions. This
problem can overcome by using complex and strong passwords for iCloud and
Google accounts.
Organizations enforce
different policies to avoid the malware vector. There is a platform at which
organization has great concern with the corporate connections so that that big
issues could overcome such as:
Make sure that the device used in an organization should buy
it from the manufacturer, not from the first user.
Use complex and strong passwords.
Never connect any corporate network like public Wi-Fi.
Don’t use the apps which are not supported by an authentic
source.
References of Malware Targeting IOS And Android Platform
F.Tchakounté and P. Dayang. "System calls
analysis of malwares on android." International Journal of Science and
Technology 2.9 (2013): 669-674.
M.Ligh, et al. "
Wiley Publishing." Malware analyst's cookbook and DVD: tools and techniques
for fighting malicious code. (2010).
M.Sikorsk and A Honig.
" no starch press." Practical malware analysis: the hands-on guide
to dissecting malicious software (2012).