Top Five Android Malware Families

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for the top five Android malware familes identified in 2011 by Fortinet.

Fortinet (NASDAQ: FTNT) - a leading network security provider and the worldwide leader of unified threat management (UTM) solutions – recently released its top five Android malware families and tested a new vulnerability that affects Android phones at the root level.

On November 15, the analyst firm Gartner issued a report that cited Google’s Android mobile operating system had reached a global 52.5 percent smartphone market share, while iOS trailed in third, behind Symbian, with an 18 percent market share. FortiGuard Labs found interesting the disparity between the amount of malware found on the Android operating system compared to that found on iOS relative to their market share size.

 “FortiGuard Labs has found approximately five times the amount of malicious families on the Android OS versus what we’ve found on iOS,” said Axelle Apvrille, senior mobile anti-virus researcher at Fortinet. “We believe that this disparity can be attributed to the way Apple handles iOS application development and distribution. Unlike Android, which makes it fairly easy to place applications for people to download, iOS requires developers to undergo some strict screening from Apple before the application can make it to the Apple Store. That’s not to say that Apple is totally immune from being infiltrated by malware – the Eeki banking worm proves that - but it is a testament to why we’re seeing so little activity on the iOS platform.”

“Unfortunately, we believe Android’s higher market share and open development environment comes with a price; an almost six fold increase in malware targeting the operating system,” Apvrille continued. “To date, our Labs have seen a 90 percent increase in Android malware families in 2011 compared to 2010, while malicious iOS families only increased by 25 percent. Of course, those statistics do not account for infection rates or dangerousness.”

Android Vulnerability

In November, Jon Larimer and Jon Oberheide published a vulnerability for Android platform 2.3.6 that revealed an easy way for hackers and malicious software developers to gain and exploit root access to an Android device.

More Slideshows:


Consumers' Increasing Reliance on Facebook and Other Social Trends New figures reveal rapid adoption of social media in consumer shopping behaviors.

Seven Enterprise Search Appliances That Can Save the Day Appliances that can help you tame out-of-control document management.

Ten Ways to Optimize SharePoint 2010 for Peak Performance Top 10 management tips for SharePoint.

 

Related Topics : Network Security, Unified Threat Management

 
More Slideshows

eCommerce9-290x195 How to Minimize Fraud this Holiday Season

Learn how your organization can improve its approach to fraud prevention and lower costs involved with fraud and ID theft this coming holiday season. ...  More >>

CyphortSecurityParadigm0x Don't Let the IT Security Paradigm Shift Leave You Stranded

While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. ...  More >>

Security60-190x128.jpg Five Steps to Integrate SAP into Your Enterprise Defense Framework

In addition to being an enterprise resource planning (ERP) tool, SAP is also a primary storage vault for a vast amount of sensitive and business-critical data. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date