type

Mobile Threat Report Q1 2013 — Android becomes more and more like Windows

mobile_report_q1_2013Our latest Mobile Threat Report is out and the findings show that the Android malware ecosystem is more and more resembling the Windows ecosystem.

New mobile threat families and variants rose by 49% from last quarter, from 100 to 149. 136, or 91.3% of these were Android and 13, or 8.7% Symbian. Q1 2013 numbers are more than double that of a year ago in Q1 2012.

While the “walled-gardens” of the iOS and Windows Phone, where apps require approval before sale, have prevented malware threats to develop for the iPhone or Nokia models running those systems, Android threats are increasing and becoming more likely to affect average users.

“I’ll put it this way: Until now, I haven’t worried about my mother with her Android because she’s not into apps,” F-Secure Security Advisor Sean Sullivan said. “Now I have reason to worry because with cases like Stels, Android malware is also being distributed via spam, and my mother checks her email from her phone.”

You can get the entire report here and as you read through it, listen to our Chief Research Officer Mikko Hypponen and Sean Sullivan walk through the report in this exclusive preview. (Sorry, there is a odd echo for the first few minutes of the recording.)

Here’s a look at profit-motivated threats. Is anyone surprised that mobile malware authors are mostly motivated by money?
fig2_profit_motivated_threats

As far as the types of threats our Labs is seeing, Trojans continue to dominate:

fig3_threats_by_type

We protect your mobile devices from all common threats. Get F-Secure Mobile Security free for 30 days or download it at Google Play .

Cheers,Jason

More posts from this topic

travel, amalfi coast, digital safety, security

6 digital ways to save your summer vacation

My wife had to remind me to look up from my smartphone. We were traveling on the one-lane coastal road that connects Sorrento with Italy's Amalfi coast. I looked down and saw the Li Galli islands, which according to local legend are where the sirens beckoned the hero of Homer's Odyssey into the rocks. In Naples, my iPhone had been my tour guide, allowing me to get pizza recommendations from my friend and then scout out when was the best time to eat, according to the reviews. It had brought us to the Museo Cappella Sansevero to see Veiled Christ and helped us chose a gelateria from the hundreds of options. And now I was plotting our visit to the beachfront town of Positano. If you're addicted to your mobile device or checking in online, you know it can improve or ruin your vacation. And missing a great view could be the least of your worries. You should look up from your phone occasionally, but you can stay connected and safe with a few precautions. 1. Lock your devices. You wouldn't leave post-it note with your PIN on your ATM card. So don't invite strangers into your phone to turn off your anti-theft app and start digging through your digital life. Use an unguessable passcode on all your devices and set your devices to lock. 2. Don't bank or shop on a public computer. Strange computers can have strange keyloggers or some other malware that could slurp up your information. (If you have to use a public computer to get on Facebook, for instance, use a one-time password.) 3. Clean up your phone. You hear lots of news reports about how gross and covered with bacteria our phones are. But the inside suffers from the same buildup of crap. "Phones and computers always store information about what you do. Internet browsers store a history," Security Advisor Sean Sullivan told us. "Apps create temporary files where they store stuff to help them run faster. A lot of apps and websites have passwords and contact information about you stored." Our free Booster app makes cleaning your device easy. 4. Assume you're being watched. What do using a ATM and logging into your MacBook Pro both say to crooks? I have money that you could take. While you're sightseeing, you become the sight criminals are seeing. You use a money belt to hold your passports, cash and credit cards -- or you should. So use the same caution whenever looking at a screen. 5. Practice safe Wi-Fi and use a VPN. If you're using someone else's Wi-Fi -- whether you're at a motel, coffee shop or a rental you booked through AirBnB -- it's someone else's Wi-Fi. Even five-star hotel network isn't 100 percent safe. So don't expect others to watch out for you. "You often have to choose between using free Wi-Fi hotspots or paying roaming charges to use your mobile connection," Sullivan said. "Using a VPN like Freedome gives you a secure funnel that lets you use public Wi-Fi connections without assuming the risks." 6. Before you go, store your important passwords and PIN codes in a safe location. Have you ever struggled with forgotten passwords or PIN codes after a relaxing summer break? Why not being a bit smarter this year, so store your passwords in a password manager, and they are there waiting for you when you come back. You can download F-Secure KEY for free for your iPhone, iPad or Android phone here. Cheers, Jason [Photo by Giuseppe Milo | Flickr]

June 10, 2015
BY 
BYOD

Why Bring your own Device (BYOD)?

Do you ever use your personal phone to make work related calls? Or send work related e-mails? Maybe you even use it to work on Google Docs, or access company files remotely? Doing these things basically means you’re implementing a BYOD policy at your work, whether they know it or not. BYOD – that’s bring your own device – isn’t really a new trend, but it is one that’s becoming more widespread. Statistics from TrackVia suggest that younger generations are embracing BYOD on a massive scale, with nearly 70% of surveyed Millennials admitting that they use their own devices and software, regardless of their employer’s policies on the matter. This is essentially pressuring employers to accept the trend, as the alternative could mean imposing security restrictions that limit how people go about their work. Consequently, Gartner predicts that 38% of businesses will stop providing employees with devices by 2016. It kind of seems like workers are enforcing the trend, and not businesses. But it’s happening because it’s so much easier to work with phones, tablets, and computers that you understand and enjoy. Work becomes easier, productivity goes up, life becomes more satisfying, etc. This might sound like an exaggeration, and maybe it is a little bit. BYOD won’t solve all of life’s problems, but it really takes advantage of the flexibility modern technology offers. And that’s what mobility should be about, and that’s what businesses are missing out on when they anchor people to a specific device. BYOD promotes a more “organic” aspect of technology in that it’s something people have already invested in and want to use, not something that’s being forced upon them. But of course, there are complications. Recent research confirms that many of these same devices have already had security issues. It’s great to enjoy the benefits of using your own phone or tablet for sending company e-mails, but what happens when things go wrong? You might be turning heads at work by getting work done faster and more efficient, but don’t expect this to continue if you happen to download some malicious software that infiltrates your company’s networks. You’re not alone if you want to use your own phone, tablet, or computer for work. And you’re not even alone if you do this without telling your boss. But there’s really no reason not to try and protect yourself first. You can use security software to reduce the risk of data breaches or malicious infections harming your employer. And there’s even a business oriented version of F-Secure's popular Freedome VPN called Freedome for Business that can actually give you additional forms of protection, and can help your company manage an entire fleet of BYOD and company-owned devices. It’s worth bringing these concerns to an employer if you find yourself using your own devices at the office. After all, statistics prove that you’re not alone in your concerns, and your employer will most likely have to address the issue sooner rather than later if they want the company to use technology wisely.  

April 17, 2015
BY 
Spring Clean your Devices

How to Spring Clean your Devices for Free

Spring cleaning is a popular pastime in many parts of Europe and North America. The cold weather is (hopefully) gone, and many people have already started the dusting, mopping, and sweeping that a good clean entails. Getting rid of clutter, old junk, and other types of waste never hurts. It avoids damage due to build up and lets you see that everything in your home has a proper place. Smart phones and computers need similar tender loving care, and I don’t mean just wiping down the dust. Computers and phones accumulate considerable amounts of wear and tear damage when you use them. Not just the mechanical parts either. Software performance degrades over time, and can cause computers to break down, or even result in security issues. Spring cleaning your phone doesn’t have to take a lot of time, or a lot of money. You can do it for free and can probably get through it in less than 10 minutes. Here’s a quick review of three things you can do to keep your phone running safe and sound. Check your Internet set-up: Many people don’t know this, but your router can be hacked. Things like weak passwords and outdated software allow hackers to break into your router and change the settings, essentially letting them manipulate what you see and do online. F-Secure recently launched a new tool called Router Checker that can help you check to make sure you’re connecting to the Internet safely. Router Checker launched less than a month ago, but has already received positive attention from websites like Tom's Hardware and Geek.com. It’s fast, free, and simple to use, so it’s worth taking a second to check the Internet set-up on your phone (or PC) to make sure it's working the way you want. Get rid of waste: Waste builds up in computers and phones, and over time this causes their performance to deteriorate. Spending a few minutes to clean out this waste and tighten the digital nuts and bolts on your software can pay off with longer lasting batteries, faster browsing and apps, and more storage space. F-Secure Booster is a free Android app that makes cleaning out your phone easy. Lots of the maintenance that phones and computers need is time consuming and difficult. F-Secure Booster centralizes different maintenance tasks into a user-friendly app. You can use it to shut down unnecessary processes that eat up your battery and memory, clean out temporary files and other data that wastes storage space, and even delete digital traces stored by your browser and other apps. It’s a quick way to make sure your phone runs quickly and securely. The PC version has a freemium offering that can clean our your computer, but also a premium variant with even more features, like a software updating tool. Secure your apps: According to F-Secure Labs, Android is a favorite target for mobile malware writers. That means people using Google’s platform need to be extra cautious about the apps they use. Fortunately, there’s a free app that can help protect your mobile phone from malware. Freedome is a popular, one-button VPN that offers users a number of different forms of protection, including App Security. App Security for Android basically checks the apps on your phone or mobile device to see if there’s anything dangerous about it. Freedome is available for a free 14-day trial for Android users. You need to buy a subscription if you want to keep using Freedome after your trial ends, but App Security will continue to function, even if you don’t subscribe. It’s a great way to keep an eye on your apps, and Freedome also offers mobile phone users communication encryption, web browsing protection, and even a selection of virtual locations that they can use to access region locked content. It’s a great way to make sure your phone stays protected after your spring clean!  [ Image by uncoolbob | Flickr ]

April 10, 2015
BY